Link : http://www.invialgo http://www.invialgo.com/2016/answ .com/2016/answer-ccna-security-final er-ccna-security-final-exam-ccnas -exam-ccnas-v2-0/ -v2-0/
Answer CCNA Security Final Exam – CCNAS v2.0
1. Which security implementation will provide control plane prot ection for a network device? encryption for remote access connections AAA for authenticating management access routing protocol authentication
NTP for consistent timestamps on logging messages
2. What is the one major major diffe d ifference rence between betwee n local AAA authentication and using us ing the login local command when configuring device access authentication? Local AAA authentication provides a way to configure backup methods of authentication, but login local does not.
The login local command requires t he administrator to manually configure the usernames and passwords, but local AAA authentication does not.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 1
Local AAA authentication allows more than one user account to be configured, but login local does not. The login local command uses local usernames and passwords stored on the router, but local AAA authentication does not.
3.
Refer to the exhibit. A network netwo rk administrator configures AAA authentication on R1. The administrator then tests the configuration by telneting to R1. The ACS servers are configured and running. What will w ill happen if the authentication fails?
The enable secret password could be used in the next login attempt. The authentication process stops. [adef ]
The username and password of the local user database could be used in the next login attempt. The enable secret password and a random username could be used in the next login attempt.
4. What are two tasks that can be accomplished with the Nmap and Zenmap network tools? (Choose two.) password recovery password auditing identification of Layer 3 protocol support on hosts TCP and UDP port scanning [adef ]
validation of IT system configuration
5. Which Cisco IOS subcommand is used to compile an IPS signature into memory? retired true event-action produce-alert Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 2
retired false
event-action deny-attacker-inline
6. Why are DES keys considered weak keys? They are more resource intensive. DES weak keys use very long key sizes. They produce identical subkeys.
DES weak keys are difficult to manage.
7. What is a benefit of using a next-generation firewall rather than a stateful firewall? reactive protection against Internet attacks granularity control within applications
support of TCP-based packet filtering filtering support for logging
8. What is a result of o f securing the Cisco IOS image using the C isco IOS Resilient Configuration feature? When the router boots up, the Cisco IOS image is loaded from a secured FTP location. The Cisco IOS image file is not visible in the th e output of the show flash command.
The Cisco IOS image is encrypted and then automatically backed up to the NVRAM. The Cisco IOS image is encrypted and then automatically backed up to a TFTP server.
9. The corporate security policy dictates dictat es that the traffic from the remote-access VPN c lients must be separated between trusted traffic that is destined for the corporate subnets and untrusted traffic destined for the public Internet. Which VPN solution should be implemented to ensure compliance with the corporate policy?
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 3
MPLS hairpinning GRE split tunneling
10. Which two conditions must be met in order for a network administrator to be able to remotely manage multiple ASAs with Cisco ASDM? (Choose two.) The ASAs must all be running the same ASDM version.
Each ASA must have the same enable secret password. Each ASA must have the same master passphrase enabled. The ASAs must be connected to each other through at least one inside interface. ASDM must be run as a local application.
11. What is negotiated in the establishment of an IPsec tunnel between two IPsec hosts during IKE Phase 1? ISAKMP SA policy
DH groups interesting traffic transform sets
12. What are two benefits of using a ZPF rather than a Classic C lassic Firewall? (Choose two.) ZPF allows interfaces to be placed into zones for IP inspection. The ZPF is not dependent on ACLs.
Multiple inspection actions are used with ZPF. ZPF policies are easy to read and troubleshoot.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 4
With ZPF, the router will allow packets unless they are explicitly blocked.
13. Which security policy characteristic defines the purpose of standards? step-by-step details regarding methods to deploy company switches recommended best practices for placement of all company switches required steps to ensure consistent configuration of all company switches
list of suggestions regarding how to quickly configure all company switches
14. What algorithm is used to provide data integrity of a message through throug h the use of a calculated ca lculated hash value? RSA DH AES HMAC
15. On which port should Dynamic ARP Inspection (DAI) be configured on a switch? an uplink port to another switch
on any port where DHCP snooping is disabled any untrusted port access ports only
16. What is a feature of a Cisco IOS Zone-Based Policy Firewall? A router interface can belong to only one zone at a time.
Service policies are applied in interface configuration mode. Router management interfaces must be manually assigned to the self zone. Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 5
The pass action works in multiple directions.
17.
Refer to the exhibit. The administrator can ping the S0/0/1 interface of RouterB but is unable to gain Telnet access to the router by using the password cisco123. What is a possible cause o f the problem?
The Telnet connection between RouterA and RouterB is not working correctly. The password cisco123 is wrong.
The administrator does not have enough rights on the PC that is being used. The enable password and the Telnet password need to be the same.
18.
Refer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration?
DHCP spoofing DHCP starvation STP manipulation MAC and IP address spoofing [adef ]
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 6
19.
Refer to the exhibit. Which conclusion ca n be made from the show crypto map command output that is shown on R1?
The crypto map has not yet been applied to an interface. [Gilardi]
The current peer IP address should be 172.30.2.1. There is a mismatch between the transform sets. [tested wrong by Adef ] The tunnel configuration was established and can be tested with extended pings.
20. What type of algorithms require sender and receiver to exchange a secret key that is used to ensure the confidentiality of messages? symmetric algorithms [original answer ]
hashing algorithms asymmetric algorithms [dellarte] public key algorithms
21. What is an advantage in using a packet filtering firewall versus a high-end firewall appliance? Packet filters perform almost all the tasks of a high-end firewall at a fraction of the cost.
Packet filters provide an initial degree of security at the data-link and network layer. Packet filters represent a complete firewall solution. Packet filters are not susceptible to IP spoofing.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 7
22.
Refer to the exhibit. In the network that is shown, which AAA command logs the use of EXEC session commands?
aaa accounting network start-stop group tacacs+ aaa accounting network start-stop group radius aaa accounting connection start-stop group radius aaa accounting exec start-stop group radius aaa accounting connection start-stop group tacacs+ aaa accounting exec start-stop group tacacs+
23. A network administrator enters the single-connection command. What effect does t his command have on AAA operation? allows a new TCP session to be established for every authorization request authorizes connections based on a list of IP addresses configured in an ACL on a Cisco ACS server allows a Cisco ACS server to minimize delay by establishing persistent TCP connections [adef ]
allows the device to establish only a single connection with the AAA-enabled server
24. Which two practices are associated with securing the features and performance of router operating systems? (Choose two.) Install a UPS. Keep a secure copy of router operating system images. Configure the router with the maximum amount of memory possible.
Disable default router services that are not necessary. Reduce the number of ports that can be used to access the router.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 8
25. Which statement describes a characteristic of the IKE protocol? It uses UDP port 500 to exchange IKE information between the security gateways.
IKE Phase 1 can be implemented in three different modes: main, aggressive, or quick. It allows for the transmission of keys directly across a network. The purpose of IKE Phase 2 is to negotiate a security association between two IKE peers.
26.
Refer to the exhibit. If a network administrator is using ASDM to configure a site-to-site VPN between the CCNAS-ASA and R3, which IP address would the administrator use for the peer IP address textbox on the ASA if data traffic is to be encrypted between the two remote LANs?
209.165.201.1
192.168.1.3 172.16.3.1 172.16.3.3 192.168.1.1
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 9
27.
Refer to the exhibit. Based on the security levels of the interfaces on the ASA, what statement correctly describes the flow of traffic allowed on the interfaces?
Traffic that is sent from the LAN and the Internet to the DMZ is considered inbound. Traffic that is sent from the DMZ and the Internet to the LAN is considered outbound. Traffic that is sent from the LAN to the DMZ is considered is considered inbound. Traffic that is sent from the DMZ and the LAN to the Internet is considered outbound.
28. What two assurances does digital signing provide about code that is downloaded from the Internet? (Choose two.) The code contains no errors. The code contains no viruses. The code has not been modified since it left the software publisher. The code is authentic and is actually sourced by the publisher.
The code was encrypted with both a private and public key.
29. Which interface option could be set through ASDM for a Cisco ASA? default route access list VLAN ID
NAT/PAT
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 10
30. What are two characteristics of a stateful firewall? (Choose two.) uses connection information maintained in a state table
uses static packet filtering techniques analyzes traffic at Layers 3, 4 and 5 of the OSI model
uses complex ACLs which can be difficult to configure prevents Layer 7 attacks
31. What are three characteristics of SIEM? (Choo se three.) can be implemented as software or as a service
Microsoft port scanning tool designed for Windows examines logs and events from systems and applications to detect security threats [adef ] consolidates duplicate event data to minimize the volume of gathered data
uses penetration testing to determine most network vulnerabilities provides real-time reporting for short-term security event analysis
32. Which type of traffic is subject to filtering on an ASA 5505 device? public Internet to inside public Internet to DMZ inside to DMZ [adef ]
DMZ to inside
33. Which IDS/IPS signature alarm will look for packets t hat are destined to or from a particular port? honey pot-based anomaly-based [ Zora] Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 11
signature-based [adef ] policy-based
34. Which three actions can the Cisco IOS Firewall IPS feature be configured to take when an intrusion activity is detected? (Choose three.) reset UDP connection reset TCP connection alert
isolate inoculate drop
35. Which two protocols can be selected using the Cisco AnyConnect VPN Wizard to protect the traffic inside a VPN tunnel? (Choose two.) Telnet SSH SSL
ESP IPsec
36. What is a characteristic of a ro le-based CLI view of router configuration? When a superview is deleted, the associated CLI views are deleted. A single CLI view can be shared within multiple superviews. [adef ]
A CLI view has a command hierarchy, with higher and lower views. Only a superview user can configure a new view and add or remove commands from the existing views. Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 12
37. Penetration testing = used to determine the possible consequences of successful attacks on the network. Vulnerability scanning = used to find weaknesses and misconfigurations on network systems. Network scanning = used to discover available resources on the network.
38. Which statement describes the use of certificate classes in the PKI? A class 5 certificate is more trustworthy than a class 4 certificate. [adef ]
Email security is provided by the vendor, not by a certificate. The lower the class number, the more trusted the certificate. A vendor must issue only one class of certificates when acting as a CA.
39.
Refer to the exhibit. An administrator issues these IOS login enhancement commands to increase the security for login connections. What can be concluded about them?
Because the login delay command was not used, a one-minute delay between login attempts is assumed. The hosts that are identified in the ACL will have access to the device.
The login block-for command permits the attacker to try 150 attempts before being sto pped to try again. These enhancements apply to all types of login connections.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 13
40. A company deploys a Cisco ASA with the Cisco CWS connector enabled as the firewall on the border of corporate network. An employee on the internal network is accessing a public website. What should the employee do in order to make sure the web traffic is protected by the Cisco CWS? Register the destination website on the Cisco ASA. Use the Cisco AnyConnect Secure Mobility Client first. Use a web browser to visit the destination website.
First visit a website that is located on a web server in the Cisco CWS infrastructure.
41. An administrator assigned a level of router access to the user ADMIN using the commands below. Router(config)# privilege exec level 14 show ip route Router(config)# enable algorithm-type scrypt secret level 14 cisco -level-10 Router(config)# username ADMIN privilege 14 algorithm-type scrypt secret cisco-level-10
Which two actions are permitted to the user ADMIN? (Choose two.) The user can execute all subcommands under the show ip interfaces command. The user can issue the show version command. The user can only execute the subcommands under the show ip route command.
The user can issue all commands because this privilege level can execute all Cisco IOS commands. The user can issue the ip route command.
42. What mechanism is used by an ASA 5505 device to allow inspected outbound traffic to return to the originating sender who is on an inside network? Network Address Translation access control lists security zones Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 14
stateful packet inspection [ John / adef ]
43. Which two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.) DSL switch Frame Relay switch ISR router another ASA
multilayer switch
44. What Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol? DHCP spoofing ARP spoofing VLAN hopping
ARP poisoning
45. In an AAA-enabled network, a user issues the configure terminal command from the pr ivileged executive mode of operation. What AAA function is at work if this command is rejected? authorization
authentication auditing accounting
46. An organization has configured an IPS solution to use atomic alerts. What type of response will occur when a signature is detected? A counter starts and a summary alert is issued when the count reaches a preconfigured number. Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 15
The TCP connection is reset. An alert is triggered each time a signature is detected. [adef ]
The interface that triggered the alert is shutdown.
47. What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.) PSK DH RSA AES [ John / adef ] SHA [ John / adef ]
48. Fill in the blank. A stateful signature is also known as a Composite signature.
49. Why is hashing cryptographically stronger compared to a cyclical redundancy check (CRC)? Hashes are never sent in plain text. It is easy to generate data with the same CRC. It is virtually impossible for two different sets of data to calculate the same hash ou tput. [adef ]
Hashing always uses a 128-bit digest, whereas a CRC can be variable length.
50. A network analyst wants to monitor the activity of all new interns. Which type of security testing would track when the interns sign on and sign off the network? vulnerability scanning password cracking Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 16
network scanning integrity checker
51.
Refer to the exhibit. What two pieces of information can be gathered from the generated message? (Choose two.)
This message is a level five notification message. This message indicates that service timestamps have been globally enabled.
This message indicates that enhanced security was configured on the vty ports. This message appeared because a major error occurred that requires immediate action. This message appeared because a minor error occurred that requires further investigation.
52. What is required for auto detection and negotiation of NAT when establishing a VPN link? Both VPN end devices must be configured for NAT. No ACLs can be applied on either VPN end device. Both VPN end devices must be NAT-T capable.
Both VPN end devices must be using IPv6.
53.
Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the co mmand show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 17
Three security violations have been detected on this interface. This port is currently up. [adef ]
The port is configured as a trunk link. Security violations will cause this port to shut down immediately.
There is no device currently connected to this port. [Gilardi] The switch port mode for this interface is access mode. [adef ]
54. In which two instances will traffic be denied as it crosses the ASA 5505 device? (Choose two.) traffic originating from the inside network going to the DMZ network traffic originating from the inside network going to the o utside network traffic originating from the outside network going to the DMZ network traffic originating from the DMZ network going to the inside network traffic originating from the outside network going to the inside network
55.
Refer to the exhibit. Based on the configuration that is shown, which statement is true about the IPS signature category?
Only signatures in the ios_ips advanced category will be compiled into memory for scanning. All signatures categories will be co mpiled into memory for scanning, but only those s ignatures within the ios ips advanced category will be used for scanning purposes. All signature categories will be compiled into memory for scanning, but only those signatures in the ios_ips basic category will be used for scanning purposes. Only signatures in the ios_ips basic category will be compiled into memory for scanning.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 18
56. Which two ports can send a nd receive Layer 2 traffic from a co mmunity port on a PVLAN? (Choose two.) community ports belonging to other communities promiscuous ports
isolated ports within the same co mmunity PVLAN edge protected ports community ports belonging to the same community
57. What is a feature of the TACACS+ protocol? It utilizes UDP to provide more efficient packet t ransfer. It combines authentication and authorization as one process. It encrypts the entire body of the packet for more secure communications.
It hides passwords during transmission using PAP and sends the rest of the packet in plaintext.
58. Which security measure is best used to limit the success of a reconnaissance attack from within a campus area network? Implement restrictions on the use of ICMP echo-reply messages. Implement a firewall at the edge o f the network. Implement access lists on the border router. Implement encryption for sensitive traffic. [adef ]
59. What is the benefit of the network-based IPS (NIPS) over host-based IPS (HIPS) deployment models? NIPS provides individual host protection. NIPS relies on centrally managed software agents. NIPS monitors all operations within an operating system. Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 19
NIPS monitors network segments.
60. What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices? LLDP on network devices? Enable CDP on edge devices, and enable LLDP on interior devices. Use the default router settings for CDP and LLDP. Use the open standard LLDP rather than CDP. Disable both protocols on all interfaces where they are not required.
61. What function is provided by the Tr ipwire network security tool? password recovery security policy compliance
IDS signature development logging of security events
62. What is the function of a policy map configuration when an ASA firewall is being configured? binding class maps with actions
identifying interesting traffic binding a service policy to an interface using ACLs to match traffic
63. If a network administrator wants to track the usage of FTP services, which keyword or keywords should be added to the aaa accounting command? exec default Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 20
connection exec
network
64. What is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence? That AAA is enabled globally on the router. That passwords and usernames are case-sensitive.
That a default local database AAA authentication is applied to all lines. That user access is limited to vty terminal lines.
65. What is the purpose of a local username database if multiple ACS servers are configured to provide authentication services? Clients using internet services are authenticated by ACS servers, whereas local clients are authenticated through a local username database. Each ACS server must be configured with a local username database in order to provide authentication services. A local username database is required when creating a method list for the default login. A local username database provides redundancy if ACS servers become unreachable. [adef ]
66.
Refer to the exhibit. Based on the security levels of the interfaces on ASA1, what traffic will be allowed on the interfaces? [Similar with Question 27 ]
Traffic from the Internet and LAN can access the DMZ. Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 21
Traffic from the Internet and DMZ can access the LAN. Traffic from the Internet can access both the DMZ and the LAN. Traffic from the LAN and DMZ can access the Internet.
67. What are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.) to ensure more efficient routing to prevent data traffic from being redirected and then discarded
to ensure faster network convergence to prevent redirection of data traffic to an insecure link
to provide data security through encryption
68. A security awareness session is best suited for which topic? required steps when reporting a breach of security
the primary purpose and use of password policies steps used to configure automatic Windows updates how to install and maintain virus protection
69. What provides both secure segmentation and threat defense in a Secure Data Center solution? Cisco Security Manager software AAA server Adaptive Security Appliance intrusion prevention system
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 22
70. Which two features should be configured on end-user ports in order to prevent STP manipulation attacks? ( Choose two.) root guard UDLD BPDU guard
loop guard PortFast
71. What is a characteristic of most modern viruses? They are usually found attached to online games. Email viruses are the most common type of them.
They replicate themselves and locate new targets. They are responsible for some of the most destructive internet attacks.
72. Which statement describes a characteristic of the Security Device Event Exchange (SDEE) feature supported by the Cisco IOS IPS? SDEE notification is disabled by default. It does not receive and process events from the Cisco IOS IPS unless SDEE notification is enabled.
SDEE notification is enabled by default. It receives and processes events from the Cisco IOS IPS and sends them to a syslog server. SDEE notification is enabled by default. It receives and processes events from the Cisco IOS IPS and stores them in a buffer. SDEE notification is disabled by default. It starts receiving and processing events from the Cisco IOS IPS as soon as an attack signature is detected.
73. Which network security tool allows an administrator to test and detect weak passwords? L0phtcrack
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 23
Tripwire Nessus Metasploit
74. What is an advantage of logging packets that are seen by an IPS device? Packets from the IP address that triggered the logging are denied once logging begins. Administrators can decide what actions can be taken in the future. Administrators can use the brief summary that is generated to quickly determine how to handle the packets. Attacker packets can be stopped immediately.
75. Which procedure is recommended to mitigate the chances of ARP spoofing? Enable DHCP snooping on selected VLANs. Enable IP Source Guard on trusted ports. Enable DAI on the management VLAN. Enable port security globally.
76. In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server? RADIUS 802.1x SSH TACACS
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 24
77. A network technician is attempting to resolve problems with the NAT configuration on anASA. The technician generates a ping from an inside host to an outside host. Whichcommand verifies that addresses are being translated on the ASA? show ip nat translation show running-config show xlate show ip address
78. What are three components of a technical security policy? (Choose three.) human resource policy acceptable use policy remote access policy identity policy network access policy end user policy
79. Which security policy outlines the o verall security goals for managers and technical perso nnel within an organization and includes the consequences of noncompliance with the policy? end-user policy application policy governing policy
technical policy
80. What is a secure configuration option for remote access to a network device? Configure 802.1x. Configure Telnet.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 25
Configure SSH. Configure an ACL and apply it to the VTY lines.
**** New Incomplete Question ****
[Gilardi] The following authentication configuration is applied to a router. aaa authentication login default tacacs+ local enable none Several days later the TACACS+ server goes off-line. Which method will be used to authenticate users? Default [Gilardi] Local [ Leilei]
Practical Question
Configure:
Basic security settings, like SSH and AAA (on all devices) STP, Portfast, BPDUguard, Loop guard, ZPF Basic Security on ASA using CLI, including default route o
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 26
network object with subnet 192.168.10.0 255.255.255.0 and nat(inside, outside) Site 2 Site VPN on R3 using CLI and on ASA using ASDM o
Again, please be aware that answers stated above is just 70% correct [98% correct as of now]. We will keep improving the question and answers. Anyone get 100% correct, please let us know. Thus, please study the questions above. If you have better answers or any new questions please do comment below. If you have the missing exhibit image, please do email to
[email protected].
Thoughts on “Answer CCNA Security Final Exam – CCNAS v2.0” 1.
el mehdi says:
January 21, 2016 at 8:40 AM thank you very much INVIALGO , for ccna security exam v2 , but i find some false answers, i will share them , but i need the exhibit of some questions , please Reply
1.
el mehdi says:
January 21, 2016 at 8:59 AM are you sure that there is only 63 question ?????? Reply
1.
InviAlgo says:
January 21, 2016 at 10:02 PM Maybe. If you have new questions, do update us. TQ Reply
2.
InviAlgo says:
January 21, 2016 at 10:01 PM Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 27
So far, this is all my compilation. If i have, of course i will update it. Reply
3.
cham says:
January 29, 2016 at 12:36 AM hi el mehedi. plz send us a correct answers.asap.we are go ing to do the exam on coming Saturday..thanks for your kindness… Reply
1.
John says:
February 10, 2016 at 6:44 PM Can you tell me how does the exam go? How many questions? How much time? Is the practical question included in those questions or is it a separate exam? What is the minimal grade for them? Reply
2.
umfeda says:
January 21, 2016 at 8:48 AM what is answer for Q-19 ? Reply
1.
InviAlgo says:
January 21, 2016 at 10:04 PM don’t know. as of now, i didn’t have the exhibit for this quest ion. Please be reminded that so far our answers are not guaranteed 100% correct. Do revise and let us know if you have better answers. Thanks Reply
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 28
1.
nicu says:
January 26, 2016 at 4:41 AM ccna security 2.0 pt practice sa part 2? Reply
3.
John testeron says:
January 23, 2016 at 10:28 PM The correct answer for 47 is: aes & sha Reply
1.
InviAlgo says:
January 31, 2016 at 12:35 PM thanks john. answer verified Reply
4.
John testeron says:
January 23, 2016 at 10:33 PM The correct answer for 42 is : stateful packet inspection Reply
1.
InviAlgo says:
January 31, 2016 at 12:36 PM thank you. Answer verified Reply
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 29
5.
Saipul says:
January 24, 2016 at 4:14 PM A security awareness session is best suited for which topic? how to install and maintain virus protection steps used to configure automatic Windows updates required steps when reporting a breach of security the primary purpose and use of password policies Reply
1.
InviAlgo says:
January 31, 2016 at 12:36 PM this is final exam question? Reply
2.
InviAlgo says:
February 1, 2016 at 9:19 AM Thank you. i miss out the question. updated Reply
6.
Gilardi RE says:
January 24, 2016 at 4:30 PM Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.) Answer : There is no device currently connected to this port.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 30
This port is currently up. Security violations will cause this port to shut down immediately.
CMIIW Reply
1.
InviAlgo says:
January 31, 2016 at 12:37 PM thanks.. Reply
7.
Gilardi RE says:
January 24, 2016 at 4:32 PM The following authentication configuration is applied to a router. aaa authentication login default tacacs+ local enable none Several days later the TACACS+ server goes off-line. Which method will be used to authenticate users? Answer : default
CMIIW Reply
1.
InviAlgo says:
January 31, 2016 at 12:38 PM it is a good idea if you can provide full question with all answers options. Thanks Reply Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 31
1.
Gilardi RE says:
January 31, 2016 at 3:23 PM maybe i will post CCNA Security 2.0 PT Practice SA Part 1, if i have much time Reply
1.
viny says:
February 3, 2016 at 2:33 AM can yu pliz send me that if yu can ……if possible tomorrow Reply
1.
InviAlgo says:
February 9, 2016 at 12:26 PM hi. i already posted it on 1st February CCNA Security 2.0 PT Practice SA – Part 1
2.
leilei says:
June 3, 2016 at 2:30 AM default is not even a method… it means apply to all interfaces. the answer should be local. Reply
1.
InviAlgo says:
June 12, 2016 at 7:58 AM Thanks Leilei Reply Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 32
8.
Gilardi RE says:
January 24, 2016 at 4:34 PM Refer to the exhibit. Which conclusion can be made from the show crypto map command output that is shown on R1? Answer : The crypto map has not yet been applied to an interface.
CMIIW Reply
1.
InviAlgo says:
January 31, 2016 at 12:39 PM thank you. updated Reply
9.
adef says:
January 25, 2016 at 3:14 AM there are a lot of wrong question. Reply
10.
adef says:
January 25, 2016 at 3:17 AM I did the exam today and I get 98%, I will post the answers. and new questions. Reply
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 33
1.
InviAlgo says:
January 31, 2016 at 12:47 PM Thanks Adef Reply
2.
Nikolay says:
January 31, 2016 at 5:28 PM Hello Adef thank you for your help, you are wonderful guy as you say you passed the exam can you tell us what is the Final Skill Exam for CCNAS v2.0 (it’s same like a v1.2 which is available at this site or other version) or is totally different ? Reply
3.
Luka says:
May 22, 2016 at 6:01 PM Hello, did u post the questions and answers yet? im doing it in 2 days time and i really need those. it would help me a lot if u could post them . thanks Reply
11.
adef says:
January 25, 2016 at 4:58 AM 3. Refer to the exhibit. A network administrator configures AAA authentication on R1. The administrator then tests the configuration by telneting to R1. The ACS servers are configured and running. What will happen if the authentication fails? The enable secret password could be used in the next login attempt. The authentication process stops. (Correct answer) The username and password of the local user database could be used in the next login attempt. The enable secret password and a random username could be used in the next login attempt.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 34
4. What are two tasks that can be accomplished with the Nmap and Zenmap network tools? (Choose two.) password recovery password auditing identification of Layer 3 protocol support on hosts. (Correct answer) TCP and UDP port scanning. (Correct answer) validation of IT system configuration 18. Refer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration? DHCP spoofing DHCP starvation STP manipulation MAC and IP address spoofing. (Correct answer) 19. Refer to the exhibit. Which conclusion can be made from the show crypto map command output that is shown on R1? The crypto map has not yet been applied to an interface. The current peer IP address should be 172.30.2.1. There is a mismatch between the transform sets. (wrong answer) The tunnel configuration was established and can be tested with extended pings. 23. A network administrator enters the single-connection command. What effect do es this command have on AAA operation? allows a new TCP session to be established for every authorization request authorizes connections based on a list of IP addresses configured in an ACL on a Cisco ACS server allows a Cisco ACS server to minimize delay by establishing persistent TCP connections. (Correct answer) allows the device to establish only a single connection with the AAA-enabled server 31. What are three characteristics of SIEM? (Choose three.) can be implemented as software or as a service. (Correct answer) Microsoft port scanning tool designed for Windows examines logs and events from systems and applications to detect security threats. (Correct answer) consolidates duplicate event data to minimize the volume of gathered data. (Correct answer) uses penetration testing to determine most network vulnerabilities provides real-time reporting for short-term security event analysis 32. Which type of traffic is subject to filtering on an ASA 5505 device? public Internet to inside public Internet to DMZ Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 35
inside to DMZ. (Correct answer) DMZ to inside 33. Which IDS/IPS signature alarm will look for packets t hat are destined to or from a particular port? honey pot-based anomaly-based signature-based. (Correct answer) policy-based 36. What is a characteristic of a role-based CLI view o f router configuration? When a superview is deleted, the associated CLI views are deleted. A single CLI view can be shared within multiple superviews. (Correct answer) A CLI view has a command hierarchy, with higher and lower views. Only a superview user can configure a new view and add or remove commands from the existing views. 38. Which statement describes the use of certificate classes in the PKI? A class 5 certificate is more trustworthy than a class 4 certificate. (Correct answer) Email security is provided by the vendor, not by a certificate. The lower the class number, the more trusted the certificate. A vendor must issue only one class of certificates when acting as a CA. 42. What mechanism is used by an ASA 5505 device to allow inspected outbound traffic to return to the originating sender who is on an inside network? Network Address Translation access control lists security zones stateful packet inspection. (Correct answer) 46. An organization has configured an IPS solution to use atomic alerts. What type of response will occur when a signature is detected? A counter starts and a summary alert is issued when the count reaches a preconfigured number. The TCP connection is reset. An alert is triggered each time a signature is detected. (Correct answer) The interface that triggered the alert is shutdown. 47. What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.) PSK DH RSA AES (Correct answer) SHA (Correct answer) 49. Why is hashing cryptographically stronger compared to a cyclical redundancy check (CRC)? Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 36
Hashes are never sent in plain text. It is easy to generate data with the same CRC. It is virtually impossible for two different sets of data to calculate the same hash output. (Correct answer) Hashing always uses a 128-bit digest, whereas a CRC can be variable length. 53. Refer to the exhibit. The network administrator is configuring the port security feature o n switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.) Three security violations have been detected on this interface. This port is currently up. (Correct answer) The port is configured as a trunk link. Security violations will cause this port to shut down immediately. (Correct answer) There is no device currently connected to this port. The switch port mode for this interface is access mode. (Correct answer) 58. Which security measure is best used to limit the success of a reconnaissance attack from within a campus area network? Implement restrictions on the use of ICMP echo-reply messages. Implement a firewall at the edge o f the network. Implement access lists on the border router. Implement encryption for sensitive traffic. (Correct answer) ** New questions ** What is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence? no answer That AAA is enabled globally on the router. That passwords and usernames are case-sensitive. That a default local database AAA authentication is applied to all lines. That user access is limited to vty terminal lines. What is the purpose of a local username database if multiple ACS servers are configured to provide authentication services? Clients using internet services are authenticated by ACS servers, whereas local clients are authenticated through a local username database. Each ACS server must be configured with a local username database in order to provide authentication services. A local username database is required when creating a method list for the default login. A local username database provides redundancy if ACS servers become unreachable. (Correct answer) ** other questions with exhibit** 17. Refer to the exhibit. The ad ministrator can ping the S0/0/1 interface of RouterB but is unable to gain Telnet access to the router by using the password cisco123. What is a possible cause of the problem? Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 37
The Telnet connection between RouterA and RouterB is not working correctly. The password cisco123 is wrong. (Correct answer) The administrator does not have enough rights on the PC that is being used. The enable password and the Telnet password need to be the same. 22. Refer to the exhibit. In the network that is shown, which AAA command logs the use of EXEC session commands? aaa accounting network start-stop group tacacs+ aaa accounting network start-stop group radius aaa accounting connection start-stop group radius aaa accounting exec start-stop group radius aaa accounting connection start-stop group tacacs+ aaa accounting exec start-stop group tacacs+ (Correct answer) 26. Refer to the exhibit. If a network administrator is using ASDM to configure a site-to-site VPN between the CCNAS-ASA and R3, which IP address would the administrator use for the peer IP address textbox on the ASA if data traffic is to be encrypted between the two remote LANs? 209.165.201.1 (Correct answer) 192.168.1.3 172.16.3.1 172.16.3.3 192.168.1.1 27. Refer to the exhibit. Based on the security levels of the interfaces on the ASA, what statement correctly describes the flow of traffic allowed o n the interfaces? Traffic that is sent from the LAN and the Internet to the DMZ is considered inbound. Traffic that is sent from the DMZ and the Internet to the LAN is considered outbound. Traffic that is sent from the LAN to the DMZ is considered is considered inbound. Traffic that is sent from the DMZ and the LAN to the Internet is considered outbound. (Correct answer) 51. Refer to the exhibit. What two pieces of information can be gathered from the generated message? (Choose two.) This message is a level five notification message. (Correct answer) This message indicates that service timestamps have been globally enabled. (Correct answer) This message indicates that enhanced security was configured on the vty ports. This message appeared because a major error occurred that requires immediate action. This message appeared because a minor error occurred that requires further investigation. 55. Refer to the exhibit. Based on the configuration that is shown, which statement is true about the IPS signature category? Only signatures in the ios_ips advanced category will be compiled into memory for scanning. All signatures categories will be compiled into memory for scanning, but only those signatures within the ios ips advanced category will be used for scanning purposes. All signature categories will be compiled into memory for scanning, but only those signatures in the ios_ips basic category will be used for scanning purposes.
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 38
Only signatures in the ios_ips basic category will be compiled into memory for scanning. (Correct answer) Reply
1.
InviAlgo says:
January 31, 2016 at 12:39 PM Thank you Adef.. It is great helps to all of us.. Reply
12.
boula says:
January 29, 2016 at 11:59 PM Hi, are you sure that these are the final questions and answers? because then i could to research for myself to get the 100% right answers, i have access to t he netacademy (like every one has) g Reply
1.
InviAlgo says:
January 31, 2016 at 12:51 PM Hi, So far our friend Adef get 98% correct.. I have updated the questions and answer. Maybe because question 19. Please confirm. Thank you Reply
1.
boula says:
February 3, 2016 at 1:36 AM
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 39
Hi, i did the test today and i got 99.2% correct, my personalized feedback: Domain Knowledge – Binary Score: 98.3% Secure Routing and Switching – 94.1% The rest is 100% each. These are a few more answers: 64. What is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence? That AAA is enabled globally on the router. That passwords and usernames are case-sensitive. (correct answer) That a default local database AAA authentication is applied to all lines. That user access is limited to vty terminal lines. 66. Refer to the exhibit. Based on the security levels of the interfaces on ASA1, what traffic will be allowed on the interfaces? [Similar with Question 27] Traffic from the Internet and LAN can access the DMZ. Traffic from the Internet and DMZ can access the LAN. Traffic from the Internet can access both the DMZ and the LAN. Traffic from the LAN and DMZ can access the Internet. (correct answer) 67. What are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.) to ensure more efficient routing to prevent data traffic from being redirected and t hen discarded (correct answer) to ensure faster network convergence to prevent redirection of data traffic to an insecure link (correct answer) to provide data security through encryption 68. A security awareness session is best suited for which topic? required steps when reporting a breach of security (correct answer) the primary purpose and use of password policies steps used to configure automatic Windows updates how to install and maintain virus prot ection And there was a new question: What is a secure configuration option for remote access to a network device? Configure 802.1x. Configure Telnet. Configure SSH. (correct answer) Configure an ACL and apply it to the VTY lines. Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 40
Reply
1.
Mike says:
July 20, 2016 at 5:04 AM So was this question and answer above validated? What is a secure configuration option for remote access to a network device? Configure 802.1x. Configure Telnet. Configure SSH. (correct answer) Configure an ACL and apply it to the VTY lines. And if so I don’t see it updated above. Reply
1.
InviAlgo says:
July 26, 2016 at 8:33 PM Hi Mike. Thanks for noticing. i missed on this. Normally i would reply to comment once updated. Thank you
2.
InviAlgo says:
July 26, 2016 at 8:48 PM Thanks Boula for your feedback. Question and answers updated Reply
13.
boula says:
February 4, 2016 at 7:15 PM i also had passed the practical exam, and the topology is the following: You have to configure: – basic security settings, like SSH and AAA (on all devices) Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 41
– STP, Portfast, BPDUguard, Loop guard – ZPF – Basic Security on ASA using CLI, including: — default route — network object with subnet 192.168.10.0 255.255.255.0 and nat(inside, outside) Site 2 Site VPN on R3 using CLI and on ASA using ASDM I configured everything, my only mistakes where – default route on asa (wrong IP address..) – network object, because i didnt use the “subnet” command – Site 2 Site VPN couldnt establish a tunnel but i still got 92 out of 100 points, so its very very easy to pass Reply
1.
InviAlgo says:
February 9, 2016 at 12:39 PM Hi Boula. Thanks a lot. If you still keep the config, maybe yu can share with us. Thank you Reply
14.
John says:
February 9, 2016 at 9:09 PM Can anyone say how the exams goes? are there 2 parts? One with questions and one practical? Reply
15.
Chris says:
February 10, 2016 at 2:33 PM I think this is a new question as this popped out for me and apparently this guide still needs some revamping as aside from this new question, 2 more questions were wrong for me. Qn: What provides both secure segmentation and threat defense in a Secure Data Center solution? Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 42
Cisco Security Manager software AAA server Adaptive Security Appliance intrusion prevention system Reply
1.
InviAlgo says:
February 13, 2016 at 2:11 PM Thanks for the new question Chris. As mentioned in this post, the answer is still not yet 100% correct. But it will helps you pass the exam. Thus, if u encounter any wrong answers, let us know which question so we can have review on the question. TQ Reply
16.
cham says:
February 14, 2016 at 2:21 PM i have got 93.3 for the exam and i did it yesterday. there were 2 new questions.i will post it next week. bcoz i forgot to bring the screen shots. Reply
1.
InviAlgo says:
March 6, 2016 at 9:03 AM Good to hear you pass the exam. We are waiting for your update. Reply
17.
zora says:
February 28, 2016 at 8:15 AM
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 43
hello, thank you for all what you do i think there is a mistake in question 33 Which IDS/IPS signature alarm will look for packets t hat are destined to or from a particular port? the correct answer is : anomaly based , not signature based you can verify in the Chapter 5.2.2.3 – Anomaly-Based Detection Reply
1.
InviAlgo says:
March 6, 2016 at 9:07 AM thanks for the answer. updated. Reply
18.
dellarte says:
February 29, 2016 at 4:45 AM Excuse me, but i’m pretty sure that the Answer for the Question 20 is : asymmetric algorithms The asymmetric algorithm (like RSA) is used to exchange a shared secret key used by symmetric (like DES) algo. Reply
1.
InviAlgo says:
March 6, 2016 at 9:08 AM Thanks. Answer updated. Reply
2.
leilei says:
June 3, 2016 at 2:20 AM
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 44
but did you fully understand the question? What type of algorithms require sender and rece iver to exchange a secret key that is used to ensure the confidentiality of messages? only the symmetric (original answer) require a pre-exchange of the key. so the original answer is correct. Reply
1.
InviAlgo says:
June 12, 2016 at 7:58 AM Thanks Leilei for correction and confirmation Reply
19.
jenny says:
March 2, 2016 at 3:12 AM New question popped up on my exam, i got 97,5% with the answers on t his website. Which two features should be configured on end-user ports in order to prevent STP manipulation attacks? ( Choose two.) root guard UDLD BPDU guard loop guard PortFast Reply
1.
InviAlgo says:
March 6, 2016 at 9:09 AM Thank you Jenny. Question Updated Reply Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 45
20.
kwatpick says:
April 2, 2016 at 8:36 PM This one was new: Which procedure is recommended to mitigate the chances of ARP spoofing? Enable DHCP snooping on selected VLANs. Enable IP Source Guard on trusted ports. Enable DAI on the management VLAN. Enable port security globally. Reply
1.
InviAlgo says:
April 10, 2016 at 1:18 PM Thanks. Question updated Reply
21.
Frank says:
April 7, 2016 at 5:09 PM Two new Questions: 1. Which network security tool allows an administrator to test and detect weak passwords? L0phtcrack Tripwire Nessus Metasploit 2. What is an advantage of logging packets that are seen by an IPS device? Packets from the IP address that triggered the logging are denied once logging begins. Administrators can decide what actions can be taken in the future. Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 46
Administrators can use the brief summary that is generated to quickly determine how to handle the packets. Attacker packets can be stopped immediately. Reply
1.
InviAlgo says:
April 10, 2016 at 1:19 PM Thanks Frank. Both questions up Reply
22.
hank says:
April 7, 2016 at 10:57 PM Hey I pass the exam with 94,1 with all the updates that you have put. Where could get the certificate exam? Thanks invialgo Reply
1.
InviAlgo says:
April 10, 2016 at 1:21 PM Happy to hear you pass your exam. You can download the cert. you may ask your trainer. Reply
23.
Joan Wilkinson says:
April 8, 2016 at 4:55 PM NEW QUESTION FOUND TODAY April 8th *Which statement describes a characteristic of the Security Device Event Exchange (SDEE) feature supported by the Cisco IOS IPS?* a. SDEE notification is disabled by default. It does not receive and process events from the Cisco IOS IPS unless SDEE notification is enabled. Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 47
b. SDEE notification is enabled by default. It receives and processes events from the Cisco IOS IPS and sends them to a syslog server. c. SDEE notification is enabled by default. It receives and processes events from the Cisco IOS IPS and stores them in a buffer. d. SDEE notification is disabled by default. It starts receiving and processing events from the Cisco IOS IPS as soon as an attack signature is detected. Somebody post the answer please. Reply
1.
InviAlgo says:
April 10, 2016 at 1:23 PM Thanks. Question up Reply
24.
Guille says:
April 8, 2016 at 5:04 PM New question in my exam: What is a characteristic of most modern viruses? a)They are usually found attached to online games. b)Email viruses are the most common type of them. ** c)They replicate themselves and locate new targets. d)They are responsible for some of the most destructive internet attacks. I find that in NetAcad(Chap 1.2.3.2). Is correct to resolv this question ? “Most viruses are now spread by USB memory drives, CDs, DVDs, network shares, and email. Email viruses are now the most common type of virus.” Reply
1.
InviAlgo says:
April 10, 2016 at 1:33 PM Thank you Guille. I guess the answer is correct. we’ll see what others say. Question and answer updated Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 48
Reply
25.
OTMANE says:
May 5, 2016 at 5:20 PM NEW QUESTION 57 In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server? RADIUS 802.1x SSH TACACS Reply
1.
InviAlgo says:
May 8, 2016 at 9:02 AM Thanks. Updated Reply
26.
geostigma says:
May 13, 2016 at 10:08 PM Passed the exam with 96% thanks to the answers provided here. New question: A network technician is attempting to resolve problems with the NAT configuration on an ASA. The technician generates a ping from an inside host to an outside host. Which command verifies that addresses are being translated on the ASA? show ip nat translation show running-config Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 49
show xlate show ip address Reply
27.
Mangury says:
May 20, 2016 at 5:25 AM Thank you very much InviAlgo, I pass the exam today with 94.1. Reply
28.
lula says:
May 23, 2016 at 1:30 AM Answer for 70 is bdpu guard and portfast, confirmed from cisco site Reply
1.
InviAlgo says:
June 12, 2016 at 7:53 AM Thanks Lula. Answer updated Reply
29.
lula says:
May 23, 2016 at 1:46 AM answer for 72 is SDEE notification is disabled by default. It does not receive and process events from the Cisco IOS IPS unless SDEE notification is enabled. Reply
1.
InviAlgo says:
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 50
June 12, 2016 at 7:54 AM Thank you. Answer updated Reply
30.
nick says:
May 26, 2016 at 4:23 AM Is the final test only questions and answers or do you have a practical test too ? Reply
31.
Luka says:
May 26, 2016 at 11:02 AM I just want to thank you for all these questions and answers. i had exam 2 days ago and got 87% by memorising this answers. i wouldn’t have done it without you. i have had fallen behind my course and this helped me finished it. thank you very much ! Reply
1.
InviAlgo says:
June 12, 2016 at 7:54 AM u are welcome Luka Reply
32.
Kkunta says:
May 30, 2016 at 3:53 PM Hi InviAlgo, I have exam next week i tried doing the practice test and i couldn’t find any answer from anywhere,they are all different. Now i a m scared if the final exam is go ing to be same. Are the final exams are same in every country and can i rely on these questions here. Reply
Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 51
1.
InviAlgo says:
June 12, 2016 at 7:57 AM yes. it is valid as of today. unless u are the most unlucky person on earth get new set of questions. if that is the case, do copy the question for us. TQ Reply
2.
Albertin says:
June 30, 2016 at 5:07 AM do you complete it ? how was your test ? thanks Reply
33.
Irinel Bratu says:
June 13, 2016 at 12:47 AM Do you have the answers for Pretest Exam and Practice Final Exam @ CCNA Security v2? Reply
34.
ninja says:
June 13, 2016 at 5:08 PM can i get question for practice final exam i got my exam on 15th june 2016 pleas help me out Reply
35.
yang says:
June 18, 2016 at 10:31 PM What are three components of a technical security policy? (Choose three.) human resource policy Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 52
acceptable use policy remote access policy identity policy network access policy end user policy Reply
1.
InviAlgo says:
June 26, 2016 at 10:10 AM Thank you. Question updated Reply
36.
Mark says:
June 27, 2016 at 7:57 AM 22 Which security policy outlines the overall security goals for managers and technical perso nnel within an organization and includes the consequences of noncompliance with the policy? end-user policy application policy governing policy technical policy Reply
1.
Fernando says:
July 6, 2016 at 9:22 AM http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3 Collected & Composed By : SUBRATA DEY
Participant of CCNA Security Course (2 nd Batch) Department of Com puter Science & Engineerin g (CSE), BUET
Ref : http://www.invialgo.com
Page 53