1. Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?
The initial packet is dropped, but subsequent packets are forwarded.
The packet is forwarded, and an...
Welcome to CCNA v5 and CCNA v5.02 Exam Answer for 2016 - 2017. We are trying the best effort to provide you the best answer for the whole exam from CCNA 1, CCNA 2, CCNA 3, CCNA 4, CCNA Security v1.2 and ITE v5.0 & v5.02 final exam.
CCNA Security v2.0 Chapter 3 Exam 2015-2016
Monday, September 5, 2016
1. Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?
accounting
accessibility
auditing
authorization*
authentication
2. Why is authentication with AAA preferred over a local database method?
It provides a fallback authentication method if the administrator forgets...
CCNA Security v2.0 Chapter 2 Exam 2015-2016
Monday, September 5, 2016
1. An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)
Enable inbound vty SSH sessions.*
Generate two-way pre-shared keys.
Configure DNS on the router.
Configure the IP domain...
CCNA Security v2.0 Chapter 1 Exam 2015-2016
Monday, September 5, 2016
1. What method can be used to mitigate ping sweeps?
using encrypted or hashed authentication protocols
installing antivirus software on hosts
deploying antisniffer software on all network devices
blocking ICMP echo and echo-replies at the network edge*
2. What are the three major components of a worm attack? (Choose three.)
a penetration mechanism
an infecting vulnerability
a payload*
an enabling vulnerability*
a probing...
Subscribe to:
Posts (Atom)