Answer CCNA Security Chapter 1 Test – CCNAS v2.0

CCNA Security

This post will share questions and answers for CCNA Security Chapter 1 Test v2.0. This questions and answers contributed by some good guys. Do say thanks to them. Hope it will helps you all. If you have new questions or answers, do comment below.

  1. What method can be used to mitigate ping sweeps?

Using encrypted or hashed authentication protocols

Installing antivirus software on hosts

Deploying antisniffer software on all network devices

Blocking ICMP echo and echo-replies at the network edge

 

  1. What are the three major components of a worm attack? (Choose three.)

a penetration mechanism

an infecting vulnerability

a payload

an enabling vulnerability

a probing mechanism

a propagation mechanism

 

  1. Which statement accurately characterizes the evolution of threats to network security?

Internal threats can cause even greater damage than external threats.

Threats have become less sophisticated while the technical knowledge needed by an attacker has grown.

Early Internet users often engaged in activities that would harm other users.

Internet architects planned for network security from the beginning.

 

  1. What causes a buffer overflow?

Launching a security countermeasure to mitigate a Trojan horse

Sending repeated connections such as Telnet to a particular device, thus denying other data sources

Downloading and installing too many software updates at one time

Attempting to write more data to a memory location than that location can hold

Sending too much information to two or more interfaces of the same device, thereby causing dropped packets

 

  1. What commonly motivates cybercriminals to attack networks as compared to hacktivists or state-sponsored hackers?

status among peers

fame seeking

financial gain

political seasons

 

  1. Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)

virus scanning

intrusion protection systems

applying user authentication

antispoofing technologies

data encryption

 

  1. Which two statements characterize DoS attacks? (Choose two.)

Examples include smurf attacks and ping of death attacks.

They attempt to compromise the availability of a network, host, or application

 

  1. An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?

Trust exploitation

Buffer overflow

Man in the middle

Port redirection

 

  1. What functional area of the Cisco Network Foundation Protection framework is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements?

Data plane

Control plane

Management plane

Forwarding plane

 

  1. What are the three components of information security ensured by cryptography? (Choose three.)

threat prevention

authorization

confidentiality

countermeasures

integrity

availability

 

  1. What is the primary method for mitigating malware?

using encrypted or hashed authentication protocols

installing antivirus software on all hosts

blocking ICMP echo and echo-replies at the network edge

deploying intrusion prevention systems throughout the network

 

  1. What is an objective of a state-sponsored attack?

to gain financial prosperity

to sell operating system vulnerabilities to other hackers

to gain attention

to right a perceived wrong

Spy on citizens, disrupt foreign government

 

  1. What role does the Security Intelligence Operations (SIO) play in the Cisco SecureX architecture?

identifying and stopping malicious traffic

authenticating users

enforcing policy

identifying applications

 

  1. What worm mitigation phase involves actively disinfecting infected systems?

Treatment

containment

inoculation

quarantine

 

  1. How is a smurf attack conducted?

by sending a large number of packets to overflow the allocated buffer memory of the target device

by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the same network

by sending a large number of TCP SYN packets to a target device from a spoofed source address

by sending an echo requesting an IP packet larger than the maximum packet size of 65,535 bytes

 

  1. What is a characteristic of a Trojan horse as it relates to network security?

Malware is contained in a seemingly legitimate executable program.

Extreme quantities of data are sent to a particular network device interface.

An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.

Too much information is destined for a particular memory block, causing additional memory areas to be affected

 

  1. What is the first step in the risk management process specified by the ISO/IEC?

Create a security policy

Conduct a risk assessment.

Inventory and classify IT assets.

Create a security governance model

 

  1. What is the significant characteristic of worm malware?

A worm can execute independently of the host system.

A worm must be triggered by an event on the host system.

Worm malware disguises itself as legitimate software.

Once installed on a host system, a worm does not replicate itself

 

  1. Which condition describes the potential threat created by Instant On in a data center?

When the primary firewall in the data center crashes

when an attacker hijacks a VM hypervisor and then launches attacks against other devices in the data center

when the primary IPS appliance is malfunctioning

when a VM that may have outdated security policies is brought online after a long period of inactivity

 

  1. What are the three core components of the Cisco Secure Data Center solution? (Choose three.)

mesh network

secure segmentation

visibility

threat defense

servers

Infrastructure

 

  1. A disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?

trust exploitation

denial of service

reconnaissance

port redirection

 

  1. Which two statements describe access attacks? (Choose two.)

Trust exploitation attacks often involve the use of a laptop to act as a rogue access point to capture and copy all network traffic in a public location, such as a wireless hotspot

To detect listening services, port scanning attacks scan a range of TCP or UDP port numbers on a host

Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or to exploit systems to execute malicious code.

Password attacks can be implemented by the use of brute-force attack methods, Trojan horses, or packet sniffers.

Port redirection attacks use a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN

 

  1. What is a ping sweep?

a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening services.

a software application that enables the capture of all network packets that are sent across a LAN.

a query and response protocol that identifies information about a domain, including the addresses that are assigned to that domain.

a network scanning technique that indicates the live hosts in a range of IP addresses

 

  1. As a dedicated network security tool, an intrusion Prevention system can provide detection and blocking of attacks in real time.

 

  1. What is the role of an IPS?

detecting and blocking of attacks in real time
authenticating and validating traffic
filtering of nefarious websites
connecting global threat information to Cisco network security devices

 

Do comment if you have any new Question or Answers

 

No one is useless in this world who lightens the burdens of another – Charles Dickens

Sharing is Caring

24 thoughts on “Answer CCNA Security Chapter 1 Test – CCNAS v2.0”

  1. 9. What functional area of the Cisco Network Foundation Protection framework is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements?
    Ans: Control Plane

    1. One of the first network security tools was the intrusion detection system (IDS). IDS and now the newer intrusion prevention system (IPS), provide real-time detection of certain types of attacks. Unlike an IDS, an IPS can also automatically block the attack in real-time.

  2. 24
    Fill in the blank.
    As a dedicated network security tool, an intrusion
    protection
    system can provide detection and blocking of attacks in real time.
    Correct Answer: prevention

  3. As a dedicated network security tool, an intrusion ____ system can provide detection and blocking of attacks in real time.
    Correct Answer: prevention

  4. Question 24 :

    As a dedicated network security tool, an intrusion ___________ system can provide detection and blocking of attacks in real time.

    Ans: PREVENTION

  5. Hello Guys, I´m about to write the CCNA Security 210-260 exams soon
    Can someone please recommend a good resource like Exam questions , VCE´s or Dumps.
    i reall need help right now.
    Thank´s in advance for your help.

  6. La pregunta y respuesta #24 es correcta, aca les dejo la informacion;

    One of the first network security tools was the intrusion detection system (IDS). IDS and now the newer intrusion prevention system (IPS), provide real-time detection of certain types of attacks. Unlike an IDS, an IPS can also automatically block the attack in real-time.

    1. Thanks sir for your confirmation. if you can identify which answers is wrong or any new questions it will be great helps to all of us.

  7. What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?

    Ans: Financial gain

    1. Hi, thanks for your feedback. But the question and answer already listed at number 5. The “hactivists” spell is wrong might be the reason you can’t find using search. TQ

  8. Q12.- None is correct

    What is an objective of a state-sponsored attack?
    to gain financial prosperity  cybercriminals
    to sell operating system vulnerabilities to other hackers  brokers
    to gain attention  Script kiddies
    to right a perceived wrong  Hactivists

    Correct would be
    Spy on citizen, disrupt foreing goverment  state-sponsored attack

    Security Awareness: Applying Practical Security in Your World – Mark Ciampa

    https://books.google.com.ar/books?id=7yBTCwAAQBAJ&pg=PA23&lpg=PA23&dq=objective+of+a+state-sponsored+attack+to+right+a+perceived+wrong&source=bl&ots=KUZrd-xU2D&sig=ZIM8HFbiL1adQ00ndz679o6xJL0&hl=es&sa=X&ved=0ahUKEwiQkLjHhrXYAhUMGZAKHR04CG8Q6AEINjAC#v=onepage&q=objective%20of%20a%20state-sponsored%20attack%20to%20right%20a%20perceived%20wrong&f=false

  9. new problem that does not exist here, might be added

    What is the role of an IPS?

    detecting and blocking of attacks in real time *
    authenticating and validating traffic
    filtering of nefarious websites
    connecting global threat information to Cisco network security devices

Leave a Reply

Your email address will not be published. Required fields are marked *