CCNA Security Chapter 11 Exam v2

CCNA Security Chapter 11 Exam Answer v2 Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets? vulnerability scanning network scanning integrity checkers penetration testing How does network scanning help assess operations security? It can simulate attacks from malicious sources. It can log abnormal activity. It can […]
Continue reading…

 

CCNA Security Chapter 10 Exam v2

CCNA Security Chapter 10 Exam Answer v2 Which statement describes the function provided to a network administratorwho uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application? The administrator can connect to and manage a single ASA. The administrator can connect to and manage multiple ASA devices. The administrator can […]
Continue reading…

 

CCNA Security Chapter 9 Exam v2

CCNA Security Chapter 9 Exam Answer v2 Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for […]
Continue reading…

 

CCNA Security Chapter 8 Exam v2

CCNA Security Chapter 8 Exam Answer v2 Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router? It will be sent unencrypted. It will be sent encrypted. It will be blocked. It will be discarded. What three protocols must be permitted through the […]
Continue reading…

 

CCNA Security Chapter 7 Exam v2

CCNA Security Chapter 7 Exam Answer v2 What is the focus of cryptanalysis? hiding secret codes developing secret codes breaking encrypted codes implementing encrypted codes How many bits does the Data Encryption Standard (DES) use for data encryption? 40 bits 56 bits 64 bits 72 bits Which statement describes the Software-Optimized Encryption Algorithm (SEAL)? SEAL […]
Continue reading…

 

CCNA Security Chapter 6 Exam v2

CCNA Security Chapter 6 Exam Answer v2 Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown? The connection between S1 and PC1 is via a crossover cable. […]
Continue reading…

 

CCNA Security Chapter 5 Exam v2

What information must an IPS track in order to detect attacks matching a composite signature? the total number of packets in the attack the attacking period used by the attacker the network bandwidth consumed by all packets the state of packets related to the attack What is a disadvantage of a pattern-based detection mechanism? The […]
Continue reading…

 

CCNA Security Chapter 4 Exam v2

CCNA Security Chapter 4 Exam Answer v2 Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet? The initial packet is dropped, but subsequent packets are […]
Continue reading…