Sponsor

Advertisment

CCNA Security v2.0 Chapter 11 Exam 2017

Tuesday, October 25, 2016

1. Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?

vulnerability scanning*

network scanning

integrity checkers

penetration testing

 

2. How does network scanning help assess operations security?

It can simulate attacks from malicious sources.

It can log abnormal activity.

It can detect open TCP ports on network systems.*

It can detect weak or blank passwords.

 

3. What is the objective of the governing policy in the security policy hierarchy structure?

It covers all rules pertaining to information security that end users should know about and follow.

It outlines the company’s overall security goals for managers and technical staff.*

It provides general policies on how the technical staff should perform security functions.

It defines system and issue-specific policies that describe what the technical staff does.

 

4. Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?

best practices document

procedure document*

standards document

guideline document

 

5. What is the purpose of a security awareness campaign?

to teach skills so employees can perform security tasks

to focus the attention of employees on security issues*

to provide users with a training curriculum that can ultimately lead to a formal degree

to integrate all the security skills and competencies into a single body of knowledge

 

6. What is the goal of network penetration testing?

detecting configuration changes on network systems

detecting potential weaknesses in systems

determining the feasibility and the potential consequences of a successful attack*

detecting weak passwords

 

7. What network security testing tool has the ability to provide details on the source of suspicious network activity?

SIEM*

SuperScan

Zenmap

Tripwire

 

8. What network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?

Nessus

Metasploit

Tripwire

Nmap*

 

9. What network testing tool can be used to identify network layer protocols running on a host?

SIEM

Nmap*

L0phtcrack

Tripwire

 

10. What type of network security test would be used by network administrators for detection and reporting of changes to network systems?

penetration testing

vulnerability scanning

integrity checking*

network scanning

 

11. What testing tool is available for network administrators who need a GUI version of Nmap?

Nessus

SIEM

Zenmap*

SuperScan

 

12. Which initial step should be followed when a security breach is found on a corporate system?

Create a drive image of the system.

Isolate the infected system.*

Establish a chain of custody.

Photograph the system.

 

13. What step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system?

Create a drive image of the system.

Isolate the infected system.

Photograph the system.*

Determine if data tampering has occurred.

 

14. Which security program is aimed at all levels of an organization, including end users and executive staff?

educational degree programs

certificate programs

awareness campaigns*

firewall implementation training courses

 

15. What is implemented by administration to instruct end users in how to effectively conduct business safely within an organization?

security awareness program*

governing policy

noncompliance consequences

technical policy

 

16. What are two major components of a security awareness program? (Choose two.)

technical policy

procedure documents

awareness campaigns*

guideline documents

education and training*

 

17. Which type of documents include implementation details that usually contain step-by-step instructions and graphics?

standards documents

procedure documents*

guideline documents

end-user policy documents

 

18. Which type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed?

guidelines

standards*

procedures

end user policies

 

19. Which policy outlines the overall security goals for managers and technical staff within a company?

acceptable use policy

technical policy

governing policy*

end-user policy

 

20. Which type of security policy includes network access standards and server security policies?

end user policy

technical policy*

governing policy

acceptable use policy

 

21. Which type of security policy includes acceptable encryption methods?

governing policy

acceptable use policy

technical policy*

end-user policy

 

22. What is the determining factor in the content of a security policy within an organization?

the security staff

the audience*

the chief executive officer

the best practices

 

23. Which executive position is ultimately responsible for the success of an organization?

Chief Technology Officer

Chief Executive Officer*

Chief Security Officer

Chief Information Officer

 

24. Match the network security testing tool with the correct function. (Not all options are used.)

Question

Answer



Read more ...

CCNA Security v2.0 Chapter 10 Exam 2017

Tuesday, October 25, 2016

1. Which statement describes the function provided to a network administratorwho uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application?

The administrator can connect to and manage a single ASA.*

The administrator can connect to and manage multiple ASA devices.

The administrator can connect to and manage multiple ASA devices and Cisco routers.

The administrator can connect to and manage multiple ASA devices, Cisco routers, and Cisco switches.

 

2. What is one benefit of using ASDM compared to using the CLI to configure the Cisco ASA?

It does not require any initial device configuration.

It hides the complexity of security commands.*

ASDM provides increased configuration security.

It does not require a remote connection to a Cisco device.

 

3. Which type of security is required for initial access to the Cisco ASDM by using the local application option?

SSL*

WPA2 corporate

biometric

AES

 

4. Which minimum configuration is required on most ASAs before ASDM can be used?

SSH

a dedicated Layer 3 management interface*

a logical VLAN interface and an Ethernet port other than 0/0

Ethernet 0/0

 

5. What must be configured on an ASA before it can be accessed by ASDM?

web server access*

Telnet or SSH

an Ethernet port other than 0/0

Ethernet 0/0 IP address

 

6. How is an ASA interface configured as an outside interface when using ASDM?

Select a check box from the Interface Type option that shows inside, outside, and DMZ.

Select outside from the Interface Type drop-down menu.

Enter the name “outside” in the Interface Name text box.*

Drag the interface to the port labeled “outside” in the ASA drawing.

 

7. Refer to the exhibit. Which Device Management menu item would be used to access theASA command line from within Cisco ASDM?

Licensing

System Image/Configuration

Management Access*

Advanced

 

8. Which ASDM configuration option is used to configure the ASA enable secret password?

Device Setup*

Monitoring

Interfaces

Device Management

 

9. Refer to the exhibit. Which Device Setup ASDM menu option would be used to configure the ASA for an NTP server?

Startup Wizard

Device Name/Password

Routing

Interfaces

System Time*

 

10. True or False?

The ASA can be configured through ASDM as a DHCP server.

false

true*

 

11. Which ASDM interface option would be used to configure an ASA as a DHCP server for local corporate devices?

DMZ

outside

local

inside*

 

12. Which ASDM configuration option re-encrypts all shared keys and passwords on an ASA?

security master

super encryption

master passphrase*

device protection

 

13. Which type of encryption is applied to shared keys and passwords when the master passphrase option is enabled through ASDM for an ASA?

3DES

public/private key

AES*

128-bit

 

14. When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)

the hash

the peer*

encryption

the ISAKMP policy

a valid access list*

IP addresses on all active interfaces

 

15. What is the purpose of the ACL in the configuration of an ISR site-to-site VPN connection?

to permit only secure protocols

to log denied traffic

to identify the peer

to define interesting traffic*

 

16. When ASDM is used to configure an ASA site-to-site VPN, what can be customized to secure traffic?

ISAKMP

IKE

IKE and ISAKMP*

preshared key

 

17. Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

clientless SSL*

site-to-site using an ACL

site-to-site using a preshared key

client-based SSL

 

18. Which remote-access VPN connection allows the user to connect by using a web browser?

IPsec (IKEv2) VPN

site-to-site VPN

clientless SSL VPN*

IPsec (IKEv1) VPN

 

19. Which remote-access VPN connection allows the user to connect using Cisco AnyConnect?

IPsec (IKEv2) VPN*

site-to-site VPN

clientless SSL VPN

IPsec (IKEv1) VPN

 

20. Which statement describes available user authentication methods when using an ASA 5505 device?

The ASA 5505 can use either a AAA server or a local database.*

The ASA 5505 only uses a AAA server for authentication.

The ASA 5505 only uses a local database for authentication.

The ASA 5505 must use both a AAA server and a local database.

 

21. Which remote-access VPN connection needs a bookmark list?

IPsec (IKEv1) VPN

IPsec (IKEv2) VPN

site-to-site VPN

clientless SSL VPN*

 

22. What occurs when a user logs out of the web portal on a clientless SSL VPN connection?

The browser cache is cleared.

Downloaded files are deleted.

The user no longer has access to the VPN.*

The web portal times out.

 

23. If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain access to the client image?

The host initiates a clientless connection to a TFTP server to download the client.

The host initiates a clientless VPN connection using a compliant web browser to download the client.*

The Cisco AnyConnect client is installed by default on most major operating systems.

The host initiates a clientless connection to an FTP server to download the client.

 

24. What is an optional feature that is performed during the Cisco AnyConnect Secure Mobility Client VPN establishment phase?

security optimization

host-based ACL installation

posture assessment*

quality of service security

 

25. Which item describes secure protocol support provided by Cisco AnyConnect?

neither SSL nor IPsec

SSL only

both SSL and IPsec*

IPsec only

 

26. What is the purpose of configuring an IP address pool to be used for client-based SSL VPN connections?

to assign addresses to the interfaces on the ASA

to identify which users are allowed to download the client image

to assign IP addresses to clients when they connect*

to identify which clients are allowed to connect



Read more ...

CCNA Security 2.0 PT Practice SA Part 1 2015-2016

Friday, October 21, 2016

CCNA Security 2.0 PT Practice SA – Part 1

A few things to keep in mind while completing this activity:

  1. Do not use the browser Back button or close or reload any exam windows during the exam.
  2. Do not close Packet Tracer when you are done. It will close automatically.
  3. Click the Submit Assessment button to submit your work.

Introduction

In this practice Packet Tracer Skills Based Assessment, you will:

  • configure basic device hardening and secure network management
  • configure port security and disable unused switch ports
  • configure an IOS IPS
  • configure a Zone-based Policy Firewall (ZPF) to implement security policies

Addressing Table

Device Interface IP Address Subnet Mask Gateway DNS server
Internet S0/0/0 209.165.200.225 255.255.255.252 n/a
S0/0/1 192.31.7.1 255.255.255.252 n/a
G0/0 192.135.250.1 255.255.255.0 n/a
Public Svr NIC 192.135.250.5 255.255.255.0 192.135.250.1
External S0/0/0 192.31.7.2 255.255.255.252 n/a
G0/0 192.31.7.62 255.255.255.224 n/a
External Web Svr NIC 192.31.7.35 255.255.255.224 192.31.7.62 192.135.250.5
External User NIC 192.31.7.33 255.255.255.224 192.31.7.62 192.135.250.5
CORP S0/0/0 209.165.200.226 255.255.255.252 n/a
S0/0/1 209.165.200.254 255.255.255.252 n/a
Internal S0/0/1 209.165.200.253 255.255.255.252 n/a
G0/0 10.1.1.254 255.255.255.0 n/a
G0/1.10 172.16.10.254 255.255.255.0 n/a
G0/1.25 172.16.25.254 255.255.255.0 n/a
G0/1.99 172.16.99.1 255.255.255.0 n/a
DMZ DNS Svr NIC 10.1.1.5 255.255.255.0 10.1.1.254 192.135.250.5
DMZ Web Svr NIC 10.1.1.2 255.255.255.0 10.1.1.254 10.1.1.5
PC0 NIC 172.16.10.5 255.255.255.0 172.16.10.254 10.1.1.5
PC1 NIC 172.16.10.10 255.255.255.0 172.16.10.254 10.1.1.5
AAA/NTP/Syslog Svr NIC 172.16.25.2 255.255.255.0 172.16.25.254 10.1.1.5
PC2 NIC 172.16.10.15 255.255.255.0 172.16.10.254 10.1.1.5
Net Admin NIC 172.16.25.5 255.255.255.0 172.16.25.254 10.1.1.5

Note: Appropriate verification procedures should be taken after each configuration task to ensure that it has been properly implemented.

Step 1: Configure Basic Device Hardening for the CORP and the Internal Routers.

  1. Configure the CORP and the Internal routers to only accept passwords with a minimum length of 10 characters.
  2. Configure an encrypted privileged level password of ciscoclass.
  3. Enable password encryption for all clear text passwords in the configuration file.
  4. Configure the console port and all vty lines with the following requirements:Note: Both the CORP and the Internal routers are already configured with the username CORPADMIN and password Ciscoccnas.
    • Use the local database for login.
    • Disconnect after being idle for 20 minutes.
  5. Disable the CDP protocol on the CORP router on the link to the Internet router.

Step 2: Configure Secure Network Management for the CORP Router.

  1. Configure the IOS login enhancement for all vty lines with the following requirements:
  • Disable logins for 30 seconds after 3 failed login attempts within 60 seconds.

Step 3: Configure Secure Network Management for the Internal Router.

  1. Configure the Internal router:
    • as an NTP client to the AAA/NTP/Syslog server
    • to update the router calendar (hardware clock) from the NTP time source
    • to timestamp log messages
    • to send logging messages to the AAA/NTP/Syslog server
  2. Configure the IOS login enhancement for all vty lines with the following requirements:
    • Disable logins for 30 seconds after 3 failed login attempts within 60 seconds.
    • Log any failed or successful login to the syslog server.
  3. Configure the Internal router to accept SSH connections. Use the following guidelines:Note: Internal is already configured with the username SSHAccess and the secret password ciscosshaccess.
    • The domain name is theccnas.com.
    • RSA encryption key pair using a modulus of 1024
    • SSH version 2, timeout of 90 seconds, and 2 authentication retries
    • All vty lines accept only SSH connections.
  4. Configure the Internal router with server-based AAA authentication and verify its functionality:Note: The AAA server is already configured with RADIUS service, a username CORPSYS, and the password LetSysIn.
    • The key to connect to the RADIUS server is corpradius.
    • AAA authentication uses the RADIUS server as the default for console line and vty lines access.
    • The local database is used as the backup if the RADIUS server connection cannot be established.

Step 4: Configure ACLs on the Internal Router to Implement Secure Management Access.

  1. Create ACL 12 to implement the security policy regarding the access to the vty lines:
  • Only users logged on to the Net Admin PC are allowed access to the vty lines.

 Step 5: Configure Device Hardening for Switch1 and Switch4

  1. Access Switch1 and Switch4 with username CORPADMIN, password Ciscoccnas, and the enable secret password of ciscoclass.
  2. Configure Switch1 to protect against STP attacks.
    • Configure PortFast on FastEthernet ports 0/1 to 0/22.
    • Enable BPDU guard on FastEthernet ports 0/1 to 0/22.
  3. Configure Switch1 port security and disable unused ports.
    • Set the maximum number of learned MAC addresses to 2 on FastEthernet ports 0/1 to 0/22. Allow the MAC address to be learned dynamically and to be retained in the running-config. Shutdown the port if a violation occurs.
    • Disable unused ports (Fa0/2-4, Fa0/6-10, Fa0/13-22).
  4. Configure the trunk link on Fa0/23 and Fa0/24 on both Switch1 and Switch4
    • Disable DTP negotiation on the trunking ports.
    • Set the native VLAN as VLAN 50 for the trunk links.

Step 6: Configure an IOS IPS on the Internal Router.

  1. On the Internal router, if asked to login, then login as CORPSYS with password LetSysIn. The enable secret password is ciscoclass.
  2. Use the IPS signature storage location at flash:.
  3. Create an IPS rule named corpips.
  4. Configure the IOS IPS to use the signature categories. Retire the all signature category and unretire the ios_ips basic category.
  5. Apply the IPS rule to the Gi0/0 interface in the out direction.
  6. Modify the ios_ips basic category. Unretire the echo request signature (signature 2004, subsig 0); enable the signature; modify the signature event-action to produce an alert and deny packets that match the signature.
  7. Verify that IPS is working properly. Net Admin in the internal network cannot ping DMZ Web Svr. DMZ Web Svr, however, can ping Net Admin.

Step 7: Configure ZPF on the CORP Router.

  1. Access the CORP router with username CORPADMIN, password Ciscoccnas, and the enable secret password of ciscoclass.
  2. Create the firewall zones.
    • Create an internal zone named CORP-INSIDE.
    • Create an external zone named INTERNET.
  3. Define a traffic class to allow traffic from the Internal network to access services in the Internet.
    • Create a class map using the option of class map type inspect with the match-any keyword. Name the class map INSIDE_PROTOCOLS.
    • Match the protocols, httptcpudpicmpdns (Please note, the order of match statements is significant only because of the scoring need in Packet Tracer.)
  4. Specify firewall policies to allow internal hosts to access Internet.
    • Create a policy map named INSIDE_TO_INTERNET.
    • Use the INSIDE_PROTOCOLS class map.
    • Specify the action of inspect for this policy map.
  5. Define a traffic class to allow traffic from the Internet to access services in the DMZ network.
    • Create a class map using the option of class map type inspect with the match-any keyword. Name the class map DMZ_WEB.
    • Match the protocols, http and dns (Please note, the order of match statements is significant only because of the scoring need in Packet Tracer.)
  6. Specify firewall policy to allow Internet traffic to access DMZ services.
    • Create a policy map named INTERNET_TO_DMZWEB.
    • Use the DMZ_WEB class map.
    • Specify the action of pass for this policy map.
  7. Apply the firewall.
    • Create a pair of zones named IN_TO_OUT_ZONE with the source as CORP-INSIDE and destination as INTERNET.
    • Specify the policy map INSIDE_TO_INTERNET for handling the traffic between the two zones.
    • Create a pair of zones named INTERNET_TO_DMZ_ZONE with the source as INTERNET and destination as CORP-INSIDE.
    • Assign interfaces to the appropriate security zones.
  8. Verify the ZPF configuration.
    • The External user can access the URLs http://www.theccnas.com and http://ift.tt/2esqc2O.
    • The External user cannot ping the DMZ Web Svr.
    • The PCs in the internal network can ping and access the External Web Svr URL.

 

CCNA Security 2.0 PT Practice SA – Part 1 question and answer will be revealed in this post. Hopefully this will helps you guys to pass this CCNA Security 2.0 Packet Tracer Practice SA Part 1 successfully. However, our current answer now only 84% correct. If you have complete 100% answer, please comment below or email to me.

CORP config

 

security  passwords min-length 10
enable secret ciscoclass
service passwordencryption
line console 0
login local
exectimeout 20 0
line vty 0 15
login local
exectimeout 20 0
exit
interface serial0/0/0
no cdp enable
login blockfor 30 attempts 3 within 60
zone security CORPINSIDE
exit
zone security INTERNET
exit
classmap type inspect matchany INSIDE_PROTOCOLS
match protocol http
match protocol tcp
match protocol udp
match protocol icmp
match protocol dns
exit
policymap type inspect INSIDE_TO_INTERNET
class type inspect INSIDE_PROTOCOLS
inspect
exit
exit
classmap type inspect matchany DMZ_WEB
match protocol http
match protocol dns
exit
policymap type inspect INTERNET_TO_DMZWEB
class type inspect DMZ_WEB
pass
exit
exit
zonepair security IN_TO_OUT_ZONE source CORPINSIDE destination INTERNET
servicepolicy type inspect INSIDE_TO_INTERNET
exit
zonepair security INTERNET_TO_DMZ_ZONE source INTERNET destination CORPINSIDE
servicepolicy type inspect INTERNET_TO_DMZWEB
exit
interface serial0/0/0
zonemember security INTERNET
exit
interface serial0/0/1
zonemember security CORPINSIDE
exit

Internal Config

security  passwords min-length 10
enable secret ciscoclass
service passwordencryption
login onfailure log
login onsuccess log
line console 0
login local
exectimeout 20 0
line vty 0 15
login local
exectimeout 20 0
exit
interface serial0/0/0
no cdp enable
login blockfor 30 attempts 3 within 60
ntp server 172.16.25.2 key 0
ntp updatecalendar
service  timestamps log datetime msec
logging host 172.16.25.2
ip domainname theccnas.com
crypto key generate rsa
1024
ip ssh version 2
ip ssh timeout 90
ip ssh authenticationretries 2
line vty 0 4
transport input ssh
exit
line vty 5 15
transport input ssh
exit
aaa newmodel
Radiusserver host 209.165.200.252 key corpradius
aaa authentication login default group radius local
aaa authentication login default local
aaa authorization exec default local
line vty 0 4
login authentication default
line vty 0 15
login authentication default
line con 0
login authentication default
exit
ip ips config location flash:
ip ips name corpips
ip ips signaturecategory
category all
retired true
exit
category ios_ips basic
retired false
exit
exit
interface Gig0/0
//Press ENTER

Switch1 Config

interface range fastEthernet0/1-22
spanningtree portfast
spanningtree bpduguard enable
switchport portsecurity
switchport portsecurity violation  shutdown
switchport portsecurity macaddress sticky
switchport portsecurity maximum 2
exit
interface range fastethernet 0/24
shutdown
interface range fastethernet 0/610
shutdown
interface range fastethernet 0/1322
shutdown
exit
interface range fa0/2324
switchport nonegotiate
switchport trunk native vlan 50

Switch4 Config

interface range fa0/23-24
switchport mode trunk
switchport nonegotiate
switchport trunk native vlan 50

To ending:

Network:Internal:AAA:Authentication:1
Network:Internal:RADIUS Client:RADIUS Server Hosts:0
Network:Internal:VTY Lines:0:Access Class In
Network:Internal:ACL:12
Network:Internal:IPS:Signature:Retired
Network:Internal:IPS:Signature:Icmp Signature Id
Network:Internal:IPS:Signature:Icmp Sub Id

Update from Commenter for 100%

access-list 12 permit host 172.16.25.5
line vty 0 15
access-class 12 in
exit

 

For Internal Config is continuing with:
interface Gi0/0
ip ips corpips out
exit
(config)#ip ips signature-definition
(config-sigdef)# signature 2004 0
(config-sigdef-sig)# status
(config-sigdef-sig-status)# retired false
(config-sigdef-sig-status)# enable true
(config-sigdef-sig-status)# exit
(config-sigdef-sig)# engine
(config-sigdef-sig-engine)# event-action produce-alert
(config-sigdef-sig-engine)# event-action deny-packet-inline
(config-sigdef-sig-engine)# exit
(config-sigdef-sig)# exit
(config-sigdef)# exit
(config)# exit

 

If you want to score a 100%, you must put one single line authentication aaa (first line) :

aaa authentication login default group radius local –> good

aaa authentication login default local ————> bad, because if you put both lines you delete the first line, that is the correct option.



from http://www.ccna5.net/
Read more ...

CCNA Security v2.0 Chapter 9 Exam 2015-2016

Friday, October 21, 2016

1. Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A, B, and C?

 

A – DMZ, B – Inside, C – Outside

A – Inside, B – DMZ, C – Outside

A – Outside, B – Inside, C – DMZ

A – DMZ, B – Outside, C – Inside*

 

2. What is one of the drawbacks to using transparent mode operation on an ASA device?

no support for IP addressing

no support for management

no support for using an ASA as a Layer 2 switch

no support for QoS*

 

3. What is a characteristic of ASA security levels?

An ACL needs to be configured to explicitly permit traffic from an interface with a lower security level to an interface with a higher security level.*

Each operational interface must have a name and be assigned a security level from 0 to 200.

The lower the security level on an interface, the more trusted the interface.

Inbound traffic is identified as the traffic moving from an interface with a higher security level to an interface with a lower security level.

 

4. Refer to the exhibit. Two types of VLAN interfaces were configured on an ASA 5505 with a Base license. The administrator wants to configure a third VLAN interface with limited functionality. Which action should be taken by the administrator to configure the third interface?

Because the ASA 5505 does not support the configuration of a third interface, the administrator cannot configure the third VLAN.

The administrator must enter the no forward interface vlan command before the nameif command on the third interface.*

The administrator configures the third VLAN interface the same way the other two were configured, because the Base license supports the proposed action.

The administrator needs to acquire the Security Plus license, because the Base license does not support the proposed action.

 

5. What command defines a DHCP pool that uses the maximum number of DHCP client addresses available on an ASA 5505 that is using the Base license?

CCNAS-ASA(config)# dhcpd address 192.168.1.20-192.168.1.50 inside

CCNAS-ASA(config)# dhcpd address 192.168.1.10-192.168.1.100 inside

CCNAS-ASA(config)# dhcpd address 192.168.1.25-192.168.1.56 inside*

CCNAS-ASA(config)# dhcpd address 192.168.1.30-192.168.1.79 inside

 

6. Which two statements are true about ASA standard ACLs? (Choose two.)

They are the most common type of ACL.

They are applied to interfaces to control traffic.

They are typically only used for OSPF routes.*

They specify both the source and destination MAC address.

They identify only the destination IP address.*

 

7. Refer to the exhibit. A network administrator is configuring the security level for the ASA. What is a best practice for assigning the security level on the three interfaces?

Outside 40, Inside 100, DMZ 0

Outside 0, Inside 35, DMZ 90

Outside 100, Inside 10, DMZ 40

Outside 0, Inside 100, DMZ 50*

 

8. Refer to the exhibit. A network administrator is configuring the security level for the ASA. Which statement describes the default result if the administrator tries to assign the Inside interface with the same security level as the DMZ interface?

The ASA allows inbound traffic initiated on the Internet to the DMZ, but not to the Inside interface.

The ASA console will display an error message.

The ASA will not allow traffic in either direction between the Inside interface and the DMZ.*

The ASA allows traffic from the Inside to the DMZ, but blocks traffic initiated on the DMZ to the Inside interface.

 

9. What is a difference between ASA IPv4 ACLs and IOS IPv4 ACLs?

ASA ACLs are always named, whereas IOS ACLs are always numbered.

Multiple ASA ACLs can be applied on an interface in the ingress direction, whereas only one IOS ACL can be applied.

ASA ACLs use the subnet mask in defining a network, whereas IOS ACLs use the wildcard mask.*

ASA ACLs do not have an implicit deny any at the end, whereas IOS ACLs do.

ASA ACLs use forward and drop ACEs, whereas IOS ACLs use permit and deny ACEs.

 

10. What is the purpose of the webtype ACLs in an ASA?

to inspect outbound traffic headed towards certain web sites

to restrict traffic that is destined to an ASDM

to monitor return traffic that is in response to web server requests that are initiated from the inside interface

to filter traffic for clientless SSL VPN users*

 

11. Refer to the exhibit. A network administrator has configured NAT on an ASA device. What type of NAT is used?

inside NAT*

static NAT

bidirectional NAT

outside NAT

 

12. Refer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group name SERVICE1?

icmp

ip

udp

tcp*

 

13. When dynamic NAT on an ASA is being configured, what two parameters must be specified by network objects? (Choose two.)

a range of private addresses that will be translated*

the interface security level

the pool of public global addresses*

the inside NAT interface

the outside NAT interface

 

14. What function is performed by the class maps configuration object in the Cisco modular policy framework?

identifying interesting traffic*

applying a policy to an interface

applying a policy to interesting traffic

restricting traffic through an interface

 

15. Refer to the exhibit. Based on the security levels of the interfaces on ASA1, what traffic will be allowed on the interfaces?

Traffic from the Internet and DMZ can access the LAN.

Traffic from the Internet and LAN can access the DMZ.

Traffic from the Internet can access both the DMZ and the LAN.

Traffic from the LAN and DMZ can access the Internet.*

 

16. What are three characteristics of the ASA routed mode? (Choose three.)

This mode is referred to as a “bump in the wire.”

In this mode, the ASA is invisible to an attacker.

The interfaces of the ASA separate Layer 3 networks and require different IP addresses in different subnets.*

It is the traditional firewall deployment mode.*

This mode does not support VPNs, QoS, or DHCP Relay.

NAT can be implemented between connected networks.*

 

17. Refer to the exhibit. An administrator has configured an ASA 5505 as indicated but is still unable to ping the inside interface from an inside host. What is the cause of this problem?

The no shutdown command should be entered on interface Ethernet 0/1.*

VLAN 1 should be the outside interface and VLAN 2 should be the inside interface.

VLAN 1 should be assigned to interface Ethernet 0/0 and VLAN 2 to Ethernet 0/1.

The security level of the inside interface should be 0 and the outside interface should be 100.

An IP address should be configured on the Ethernet 0/0 and 0/1 interfaces.

 

18. Refer to the exhibit. According to the command output, which three statements are true about the DHCP options entered on the ASA 5505? (Choose three.)

The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP client.

The dhcpd auto-config outside command was issued to enable the DHCP server.

The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP server.*

The dhcpd auto-config outside command was issued to enable the DHCP client.*

The dhcpd enable inside command was issued to enable the DHCP client.

The dhcpd enable inside command was issued to enable the DHCP server.*

 

19. Refer to the exhibit. What will be displayed in the output of the show running-config objectcommand after the exhibited configuration commands are entered on an ASA 5505?

host 192.168.1.4

host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10 192.168.1.20

host 192.168.1.4 and range 192.168.1.10 192.168.1.20

host 192.168.1.3 and host 192.168.1.4

range 192.168.1.10 192.168.1.20*

host 192.168.1.3

 

20. What must be configured on a Cisco ASA device to support local authentication?

AAA*

the IP address of the RADIUS or TACACS+ server

encrypted passwords

SSHv2

RSA keys

 

21. Which statement describes a difference between the Cisco ASA IOS CLI feature and the router IOS CLI feature?

ASA uses the ? command whereas a router uses the help command to receive help on a brief description and the syntax of a command.

To use a show command in a general configuration mode, ASA can use the command directly whereas a router will need to enter the do command before issuing the show command.*

To complete a partially typed command, ASA uses the Ctrl+Tab key combination whereas a router uses the Tab key.

To indicate the CLI EXEC mode, ASA uses the % symbol whereas a router uses the # symbol.

 

22. What are two factory default configurations on an ASA 5505? (Choose two.)

VLAN 2 is configured with the name inside.

The internal web server is disabled.

DHCP service is enabled for internal hosts to obtain an IP address and a default gateway from the upstream device.

PAT is configured to allow internal hosts to access remote networks through an Ethernet interface.*

VLAN 1 is assigned a security level of 100.*

 

23. Which type of NAT would be used on an ASA where 10.0.1.0/24 inside addresses are to be translated only if traffic from these addresses is destined for the 198.133.219.0/24 network?

policy NAT*

dynamic NAT

static NAT

dynamic PAT

 

24. Which statement describes a feature of AAA in an ASA device?

Accounting can be used alone.*

Authorization is enabled by default.

If authorization is disabled, all authenticated users will have a very limited access to the commands.

Both authorization and accounting require a user to be authenticated first.

 

25. A network administrator is working on the implementation of the Cisco Modular Policy Framework on an ASA device. The administrator issues a clear service-policy command. What is the effect after this command is entered?

All class map configurations are removed.

All service policy statistics data are removed.*

All service policies are removed.

All policy map configurations are removed.

 

26. What is needed to allow specific traffic that is sourced on the outside network of an ASA firewall to reach an internal network?

ACL*

NAT

dynamic routing protocols

outside security zone level 0



from http://www.ccna5.net/
Read more ...

CCNA Security v2.0 Chapter 8 Exam 2015-2016

Friday, October 21, 2016

1. Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?

 

It will be sent unencrypted.*

It will be sent encrypted.

It will be blocked.

It will be discarded.

 

2. What three protocols must be permitted through the company firewall for establishment of IPsec site-to-site VPNs? (Choose three.)

HTTPS

SSH

AH*

ISAKMP*

NTP

ESP*

 

3. Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?

The length of a key does not affect the degree of security.

The shorter the key, the harder it is to break.

The length of a key will not vary between encryption algorithms.

The longer the key, the more key possibilities exist.*

 

4. What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?

By applying the ACL on a public interface, multiple crypto ACLs can be built to prevent public users from connecting to the VPN-enabled router.

Multiple crypto ACLs can define multiple remote peers for connecting with a VPN-enabled router across the Internet or network.

Multiple crypto ACLs can be configured to deny specific network traffic from crossing a VPN.

When multiple combinations of IPsec protection are being chosen, multiple crypto ACLs can define different traffic types.*

 

5. Consider the following configuration on a Cisco ASA:

crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

What is the purpose of this command?

to define the ISAKMP parameters that are used to establish the tunnel

to define the encryption and integrity algorithms that are used to build the IPsec tunnel*

to define what traffic is allowed through and protected by the tunnel

to define only the allowed encryption algorithms

 

6. Which transform set provides the best protection?

crypto ipsec transform-set ESP-DES-SHA esp-aes-256 esp-sha-hmac*

crypto ipsec transform-set ESP-DES-SHA esp-3des esp-sha-hmac

crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto ipsec transform-set ESP-DES-SHA esp-aes esp-des esp-sha-hmac

 

7. Which three ports must be open to verify that an IPsec VPN tunnel is operating properly? (Choose three.)

168

50*

169

501

500*

51*

 

8. When is a security association (SA) created if an IPsec VPN tunnel is used to connect between two sites?

after the tunnel is created, but before traffic is sent

only during Phase 2

only during Phase 1

during both Phase 1 and 2*

 

9. In which situation would the Cisco Discovery Protocol be disabled?

when a Cisco VoIP phone attaches to a Cisco switch

when a Cisco switch connects to another Cisco switch

when a Cisco switch connects to a Cisco router

when a PC with Cisco IP Communicator installed connects to a Cisco switch*

 

10. Which two statements accurately describe characteristics of IPsec? (Choose two.)

IPsec works at the transport layer and protects data at the network layer.

IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.

IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.

IPsec is a framework of open standards that relies on existing algorithms.*

IPsec works at the network layer and operates over all Layer 2 protocols.*

IPsec works at the application layer and protects all application data.

 

11. Which action do IPsec peers take during the IKE Phase 2 exchange?

exchange of DH keys

negotiation of IPsec policy*

negotiation of IKE policy sets

verification of peer identity

 

12. Which three statements describe the IPsec protocol framework? (Choose three.)

AH provides integrity and authentication.*

ESP provides encryption, authentication, and integrity.*

AH uses IP protocol 51.*

AH provides encryption and integrity.

ESP uses UDP protocol 50.

ESP requires both authentication and encryption.

 

13. Which statement accurately describes a characteristic of IPsec?

IPsec works at the application layer and protects all application data.

IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.

IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.

IPsec works at the transport layer and protects data at the network layer.

IPsec is a framework of open standards that relies on existing algorithms.*

 

14. Which two IPsec protocols are used to provide data integrity?

SHA*

AES

DH

MD5*

RSA

 

15. What is the function of the Diffie-Hellman algorithm within the IPsec framework?

provides authentication

allows peers to exchange shared keys*

guarantees message integrity

provides strong data encryption

 

16. Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?

MD5

AES

SHA*

DH

 

17. What is needed to define interesting traffic in the creation of an IPsec tunnel?

security associations

hashing algorithm

access list*

transform set

 

18. Refer to the exhibit. What algorithm will be used for providing confidentiality?

RSA

Diffie-Hellman

DES

AES*

 

19. Which technique is necessary to ensure a private transfer of data using a VPN?

encryption*

authorization

virtualization

scalability

 

20. Which statement describes a VPN?

VPNs use open source virtualization software to create the tunnel through the Internet.

VPNs use virtual connections to create a private network through a public network.*

VPNs use dedicated physical connections to transfer data between remote users.

VPNs use logical connections to create public networks through the Internet.

 

21. Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

ESP

IPsec*

MD5

AES

 

22. What is the purpose of NAT-T?

enables NAT for PC-based VPN clients

permits VPN to work when NAT is being used on one or both ends of the VPN*

upgrades NAT for IPv4

allows NAT to be used for IPv6 addresses

 

23. Which term describes a situation where VPN traffic that is is received by an interface is routed back out that same interface?

GRE

split tunneling

MPLS

hairpinning*

 

24. What is an important characteristic of remote-access VPNs?

The VPN configuration is identical between the remote devices.

Internal hosts have no knowledge of the VPN.

Information required to establish the VPN must remain static.

The VPN connection is initiated by the remote user.*

 

25. Which type of site-to-site VPN uses trusted group members to eliminate point-to-point IPsec tunnels between the members of a group?

DMVPN

GRE

GETVPN*

MPLS

 

26. Refer to the exhibit. Which pair of crypto isakmp key commands would correctly configure PSK on the two routers?

R1(config)# crypto isakmp key cisco123 address 209.165.200.227
R2(config)# crypto isakmp key cisco123 address 209.165.200.226*

R1(config)# crypto isakmp key cisco123 address 209.165.200.226
R2(config)# crypto isakmp key cisco123 address 209.165.200.227

R1(config)# crypto isakmp key cisco123 hostname R1
R2(config)# crypto isakmp key cisco123 hostname R2

R1(config)# crypto isakmp key cisco123 address 209.165.200.226
R2(config)# crypto isakmp key secure address 209.165.200.227



from http://www.ccna5.net/
Read more ...

CCNA Security v2.0 Chapter 7 Exam 2015-2016

Friday, October 21, 2016

1. What is the focus of cryptanalysis?

hiding secret codes

developing secret codes

breaking encrypted codes*

implementing encrypted codes

 

2. How many bits does the Data Encryption Standard (DES) use for data encryption?

40 bits

56 bits*

64 bits

72 bits

 

3. Which statement describes the Software-Optimized Encryption Algorithm (SEAL)?

SEAL is a stream cipher.*

It uses a 112-bit encryption key.

It is an example of an asymmetric algorithm.

It requires more CPU resources than software-based AES does.

 

4. Which encryption algorithm is an asymmetric algorithm?

DH*

SEAL

3DES

AES

 

5. An online retailer needs a service to support the nonrepudiation of the transaction. Which component is used for this service?

the private key of the retailer

the unique shared secret known only by the retailer and the customer

the public key of the retailer

the digital signatures*

 

6. In which situation is an asymmetric key algorithm used?

Two Cisco routers authenticate each other with CHAP.

User data is transmitted across the network after a VPN is established.

An office manager encrypts confidential files before saving them to a removable device.

A network administrator connects to a Cisco router with SSH.*

 

7. What is the purpose of a nonrepudiation service in secure communications?

to ensure that encrypted secure communications cannot be decoded

to confirm the identity of the recipient of the communications

to provide the highest encryption level possible

to ensure that the source of the communications is confirmed*

 

8. Which objective of secure communications is achieved by encrypting data?

integrity

authentication

confidentiality*

availability

 

9. Why is the 3DES algorithm often preferred over the AES algorithm?

3DES is more trusted because it has been proven secure for a longer period than AES.*

AES is more expensive to implement than 3DES.

3DES performs better in high-throughput, low-latency environments than AES.

Major networking equipment vendors such as Cisco have not yet adopted AES.

 

10. What is the most common use of the Diffie-Helman algorithm in communications security?

to create password hashes for secure authentication

to provide routing protocol authentication between routers

to encrypt data for secure e-commerce communications

to secure the exchange of keys used to encrypt data*

 

11. Which type of encryption algorithm uses public and private keys to provide authentication, integrity, and confidentiality?

symmetric

shared secret

IPsec

asymmetric*

 

12. How do modern cryptographers defend against brute-force attacks?

Use statistical analysis to eliminate the most common encryption keys.

Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.*

Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.

Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.

 

13. Which encryption protocol provides network layer confidentiality?

IPsec protocol suite*

Transport Layer Security

Secure Hash Algorithm 1

Secure Sockets Layer

Keyed MD5

Message Digest 5

 

14. Refer to the exhibit. Which encryption algorithm is described in the exhibit?

RC4

AES

3DES*

DES

SEAL

 

15. Which statement describes asymmetric encryption algorithms?

They have key lengths ranging from 80 to 256 bits.

They include DES, 3DES, and AES.

They are also called shared-secret key algorithms.

They are relatively slow because they are based on difficult computational algorithms.*

 

16. Which two non-secret numbers are initially agreed upon when the Diffie-Hellman algorithm is used? (Choose two.)

binomial coefficient

generator*

elliptic curve invariant

prime modulus*

topological index

pseudorandom nome

 

17. In what situation would an asymmetric algorithm most likely be used?

logging onto a computer

making an online purchase*

uploading a networking book chapter using FTP

transferring a large stream of data between two corporate locations

 

18. Why is asymmetric algorithm key management simpler than symmetric algorithm key management?

It uses fewer bits.

Only one key is used.

Two public keys are used for the key exchange.

One of the keys can be made public.*

 

19. What is the purpose of code signing?

source identity secrecy

integrity of source .EXE files*

reliable transfer of data

data encryption

 

20. Which algorithm can ensure data confidentiality?

MD5

PKI

RSA

AES*

 

21. What is the purpose of a digital certificate?

It guarantees that a website has not been hacked.

It authenticates a website and establishes a secure connection to exchange confidential data.*

It provides proof that data has a traditional signature attached.

It ensures that the person who is gaining access to a network device is authorized.

 

22. Fill in the blank.

A shared secret is a key used in a symmetric encryption algorithm.



from http://www.ccna5.net/
Read more ...

CCNA Security v2.0 Chapter 6 Exam 2015-2016

Friday, October 21, 2016

1. Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?

The connection between S1 and PC1 is via a crossover cable.

The Fa0/24 interface of S1 is configured with the same MAC address as the Fa0/2 interface.

S1 has been configured with a switchport port-security aging command.

The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.*

 

2. Two devices that are connected to the same switch need to be totally isolated from one another. Which Cisco switch security feature will provide this isolation?

PVLAN Edge*

DTP

SPAN

BPDU guard

 

3. Which two functions are provided by Network Admission Control? (Choose two.)

protecting a switch from MAC address table overflow attacks

enforcing network security policy for hosts that connect to the network*

ensuring that only authenticated hosts can access the network*

stopping excessive broadcasts from disrupting network traffic

limiting the number of MAC addresses that can be learned on a single switch port

 

4. Which spanning-tree enhancement prevents the spanning-tree topology from changing by blocking a port that receives a superior BPDU?

BDPU filter

PortFast

BPDU guard

root guard*

 

5. Which security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch?

root guard

port security*

storm control

BPDU filter

 

6. In what situation would a network administrator most likely implement root guard?

on all switch ports (used or unused)

on all switch ports that connect to a Layer 3 device

on all switch ports that connect to host devices

on all switch ports that connect to another switch

on all switch ports that connect to another switch that is not the root bridge*

 

7. What component of Cisco NAC is responsible for performing deep inspection of device security profiles?

Cisco NAC Profiler

Cisco NAC Agent*

Cisco NAC Manager

Cisco NAC Server

 

8. What is the role of the Cisco NAC Manager in implementing a secure networking infrastructure?

to define role-based user access and endpoint security policies*

to assess and enforce security policy compliance in the NAC environment

to perform deep inspection of device security profiles

to provide post-connection monitoring of all endpoint devices

 

9. What is the role of the Cisco NAC Server within the Cisco Secure Borderless Network Architecture?

providing the ability for company employees to create guest accounts

providing post-connection monitoring of all endpoint devices

defining role-based user access and endpoint security policies

assessing and enforcing security policy compliance in the NAC environment*

 

10. What is the role of the Cisco NAC Guest Server within the Cisco Borderless Network architecture?

It defines role-based user access and endpoint security policies.

It provides the ability for creation and reporting of guest accounts.*

It provides post-connection monitoring of all endpoint devices.

It performs deep inspection of device security profiles.

 

11. Which three functions are provided under Cisco NAC framework solution? (Choose three.)

VPN connection

AAA services*

intrusion prevention

scanning for policy compliance*

secure connection to servers

remediation for noncompliant devices*

 

12. Which feature is part of the Antimalware Protection security solution?

file retrospection*

user authentication and authorization

data loss prevention

spam blocking

 

13. What security countermeasure is effective for preventing CAM table overflow attacks?

DHCP snooping

Dynamic ARP Inspection

IP source guard

port security*

 

14. What is the behavior of a switch as a result of a successful CAM table attack?

The switch will forward all received frames to all other ports.*

The switch will drop all received frames.

The switch interfaces will transition to the error-disabled state.

The switch will shut down.

 

15. What additional security measure must be enabled along with IP Source Guard to protect against address spoofing?

port security

BPDU Guard

root guard

DHCP snooping*

 

16. What are three techniques for mitigating VLAN hopping attacks? (Choose three.)

Set the native VLAN to an unused VLAN.*

Disable DTP.*

Enable Source Guard.

Enable trunking manually.*

Enable BPDU guard.

Use private VLANs.

 

17. What two mechanisms are used by Dynamic ARP inspection to validate ARP packets for IP addresses that are dynamically assigned or IP addresses that are static? (Choose two.)

MAC-address-to-IP-address bindings*

RARP

ARP ACLs*

IP ACLs

Source Guard

 

18. What protocol should be disabled to help mitigate VLAN hopping attacks?

STP

ARP

CDP

DTP*

 

19. What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?

DHCP spoofing

CAM table attack

IP address spoofing

DHCP starvation*

 

20. What is the only type of port that an isolated port can forward traffic to on a private VLAN?

a community port

a promiscuous port*

another isolated port

any access port in the same PVLAN

 

21. Which STP stability mechanism is used to prevent a rogue switch from becoming the root switch?

Source Guard

BPDU guard

root guard*

loop guard

 

22. How can a user connect to the Cisco Cloud Web Security service directly?

through the connector that is integrated into any Layer 2 Cisco switch

by using a proxy autoconfiguration file in the end device*

by accessing a Cisco CWS server before visiting the destination web site

by establishing a VPN connection with the Cisco CWS

 

23. What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

enforcing the placement of root bridges

preventing buffer overflow attacks

preventing rogue switches from being added to the network*

protecting against Layer 2 loops

 

24. DHCP snooping is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.



from http://www.ccna5.net/
Read more ...