CCNA Security v2.0 Chapter 1 Exam Answers
CCNA Security v2.0 Chapter 1 Exam Answers
CCNA Security v2.0 Chapter 1 Exam Answers
WWW.CCNA-v5.Net
2. What are the three major components of a worm attack? (Choose three.)
o
o
o
o
o
o
a penetration mechanism
an infecting vulnerability
a payload
an enabling vulnerability
a probing mechanism
a propagation mechanism
Internal threats can cause even greater damage than external threats.
Threats have become less sophisticated while the technical knowledge needed by an
attacker has grown.
Early Internet users often engaged in activities that would harm other users.
Internet architects planned for network security from the beginning.
Page 1
WWW.CCNA-v5.Net
political reasons
6. Which two network security solutions can be used to mitigate DoS attacks?
(Choose two.)
o
o
o
o
o
virus scanning
intrusion protection systems
applying user authentication
antispoofing technologies
data encryption
8. An attacker is using a laptop as a rogue access point to capture all network traffic
from a targeted user. Which type of attack is this?
o
o
o
o
trust exploitation
buffer overflow
man in the middle
port redirection
data plane
control plane
management plane
forwarding plane
10. What are the three components of information security ensured by cryptography?
(Choose three.)
o
o
o
o
o
o
threat prevention
authorization
confidentiality
countermeasures
integrity
availability
Page 2
WWW.CCNA-v5.Net
13. What role does the Security Intelligence Operations (SIO) play in the Cisco
SecureX architecture?
o
o
o
o
14. What worm mitigation phase involves actively disinfecting infected systems?
o
Treatment
by sending a large number of packets to overflow the allocated buffer memory of the
target device
by sending a large number of ICMP requests to directed broadcast addresses from a
spoofed source address on the same network
by sending a large number of TCP SYN packets to a target device from a spoofed
source address
by sending an echo request in an IP packet larger than the maximum packet size of
65,535 bytes
CCNA 5
Page 3
WWW.CCNA-v5.Net
17. What is the first step in the risk management process specified by the ISO/IEC?
o
o
o
o
19. Which condition describes the potential threat created by Instant On in a data
center?
o
o
o
o
20. What are the three core components of the Cisco Secure Data Center solution?
(Choose three.)
o
o
o
o
o
o
mesh network
secure segmentation
visibility
threat defense
servers
infrastructure
trust exploitation
denial of service
reconnaissance
port redirection
CCNA 5
Page 4
WWW.CCNA-v5.Net
Trust exploitation attacks often involve the use of a laptop to act as a rogue access point
to capture and copy all network traffic in a public location, such as a wireless hotspot.
To detect listening services, port scanning attacks scan a range of TCP or UDP port
numbers on a host
Buffer overflow attacks write data beyond the hallocated buffer memory to overwrite
valid data or to exploit systems to execute malicious code.
Password attacks can be implemented by the use os brute-force attack methods, Trojan
horse, or packet sniffers.
Port redirection attacks use a network adapter card in promiscuous mode to capture all
network packets that are sent across a LAN.
a scanning technique that examines a range of TCP or UDP port numbers on a host to
detect listening services.
a software application that enables the capture of all network packets that are sent
across a LAN.
a query and response protocol that identifies information about a domain, including the
addresses that are assigned to that domain
a network scanning technique that indicates the live hosts in a range of IP addresses.
24. As a dedicated network security tool, an intrusion Protection system can provide
detection and blocking of attacks in real time.
CCNA 5
Page 5