CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 5 Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are two uses of an access control list? (Choose two.) Standard ACLs can restrict access to specific applications and ports. ACLs provide a basic level of security for network access. ACLs can control which areas a host can access on a network. ACLs assist the router in determining the best path to a destination. ACLs can permit or deny traffic based upon the MAC address originating on the router.

ACLs can control which areas a host can access on a network. ACLs provide a basic level of security for network access.

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols? IPsec GRE IKE OSPF

GRE

What are two types of addresses found on network end devices? (Choose two.) MAC UDP IP return TCP

IP, MAC

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN? AES MD5 ESP IPsec

IPsec

What is a feature of the TACACS+ protocol? What is a feature of the TACACS+ protocol? It encrypts the entire body of the packet for more secure communications. It combines authentication and authorization as one process. It hides passwords during transmission using PAP and sends the rest of the packet in plaintext. It utilizes UDP to provide more efficient packet transfer.

It encrypts the entire body of the packet for more secure communications.

Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments? Layer 2 Layer 3 Layer 4 Layer 7

Layer 2

What is true concerning physical and logical topologies? Physical topologies are concerned with how a network transfers frames. The logical topology is always the same as the physical topology. Physical topologies display the IP addressing scheme of each network. Logical topologies refer to how a network transfers data between devices.

Logical topologies refer to how a network transfers data between devices.

Which protocol or service is used to automatically synchronize the software clocks on Cisco routers? SNMP DHCP DNS NTP

NTP

Which two statements are true about NTP servers in an enterprise network? (Choose two.) NTP servers control the mean time between failures (MTBF) for key network devices. NTP servers ensure an accurate time stamp on logging and debugging information. All NTP servers synchronize directly to a stratum 1 time source. There can only be one NTP server on an enterprise network. NTP servers at stratum 1 are directly connected to an authoritative time source.

NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information.

End Device

Printer, PC, Smart Device

DMZ

Refer to the exhibit. The network "A" contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as "A"?

Intermediary

Router, switch, firewall

Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured? SSID ESS ad hoc BESS

SSID

IPS and IDS

Security devices that use signatures to detect patterns in network traffic

Which device can control and manage a large number of corporate APs? switch WLC LWAP router

WLC

dynamic route

added when a protocol such as OSPF or EIGRP discovers a

What is the function of the distribution layer of the three-layer network design model? providing high speed connection to the network edge providing secure access to the Internet aggregating access layer connections providing direct access to the network

aggregating access layer connections

What does the TACACS+ protocol provide in a AAA deployment? AAA connectivity via UDP password encryption without encrypting the packet compatibility with previous TACACS protocols authorization on a per-user or per-group basis

authorization on a per-user or per-group basis

directly connected interface

automatically added when an interface is configured and active

What is a function of a proxy firewall? drops or forwards traffic based on packet header information filters IP traffic between bridged interfaces connects to remote servers on behalf of clients uses signatures to detect patterns in network traffic

connects to remote servers on behalf of clients

A Cisco router is running IOS 15. What are the two routing table entry types that will be added when a network administrator brings an interface up and assigns an IP address to the interface? (Choose two.) local route interface directly connected interface route that is manually entered by a network administrator route that is learned via OSPF route that is learned via EIGRP

directly connected interface local route interface

Which layer of the hierarchical design model is a control boundary between the other layers? access core network distribution

distribution

packet filter firewall

enforces an access control policy based on packet content

stateful firewall

filters traffic based on defined rules as well as connection context

application gateway

filters traffic on layer 7 information

local route interface

found only in routers running IOS 15+ or IPv6 routing

static route

manually configured by a network administrator

For which discovery mode will an AP generate the most traffic on a WLAN? mixed mode open mode passive mode active mode

passive mode

Which wireless parameter is used by an access point to broadcast frames that include the SSID? passive mode channel setting security mode active mode

passive mode

Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.) 802.1X support password encryption SIP support utilization of transport layer protocols separate authentication and authorization processes

password encryption utilization of transport layer protocols

What is the only attribute used by standard access control lists to identify traffic? source MAC address protocol type source TCP port source IP address

source IP address

Which LAN topology requires a central intermediate device to connect end devices? mesh bus star ring

star

Which protocol or service allows network administrators to receive system messages that are provided by network devices? NetFlow SNMP NTP syslog

syslog

What information within a data packet does a router use to make forwarding decisions? the destination host name the destination MAC address the destination IP address the destination service requested

the destination IP address

What is the role of an IPS? to detect patterns of malicious traffic by the use of signature files to filter traffic based on defined rules and connection context to enforce access control policies based on packet content to filter traffic based on Layer 7 information

to detect patterns of malicious traffic by the use of signature files


Set pelajaran terkait

Reading Quiz 11 (CH 7.8-7.10, 8.4, 9.0-9.6)

View Set

Theme 3: Ethical practice of science

View Set

Chapter 09: Managerial Decision Making

View Set

Immunization Training: Modules 11-20

View Set

Financial Management Midterm Exam

View Set