CCNA Security v2.0 Chapter 1 Simulator Exam Online
CCNA Security v2.0 Exam Training | |
---|---|
Time | 60 minutes |
Questions | 24 |
CCNA Security v2.0 Chapter 1 Simulator Exam
Time limit: 0
Quiz-summary
0 of 24 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
Information
CCNA Security v2.0 Chapter 1 Simulator Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 24 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Your result has been entered into leaderboard
Loading
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- Answered
- Review
-
Question 1 of 24
1. Question
1 pointsWhat method can be used to mitigate ping sweeps?
Correct
Incorrect
-
Question 2 of 24
2. Question
3 pointsWhat are the three major components of a worm attack? (Choose three.)
Correct
Incorrect
-
Question 3 of 24
3. Question
1 pointsWhich statement accurately characterizes the evolution of threats to network security?
Correct
Incorrect
-
Question 4 of 24
4. Question
1 pointsWhat causes a buffer overflow?
Correct
Incorrect
-
Question 5 of 24
5. Question
1 pointsWhat commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?
Correct
Incorrect
-
Question 6 of 24
6. Question
2 pointsWhich two network security solutions can be used to mitigate DoS attacks? (Choose two.)
Correct
Incorrect
-
Question 7 of 24
7. Question
2 pointsWhich two statements characterize DoS attacks? (Choose two.)
Correct
Incorrect
-
Question 8 of 24
8. Question
1 pointsAn attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?
Correct
Incorrect
-
Question 9 of 24
9. Question
1 pointsWhat functional area of the Cisco Network Foundation Protection framework is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements?
Correct
Incorrect
-
Question 10 of 24
10. Question
3 pointsWhat are the three components of information security ensured by cryptography? (Choose three.)
Correct
Incorrect
-
Question 11 of 24
11. Question
1 pointsWhat is the primary method for mitigating malware?
Correct
Incorrect
-
Question 12 of 24
12. Question
1 pointsWhat is an objective of a state-sponsored attack?
Correct
Incorrect
-
Question 13 of 24
13. Question
1 pointsWhat role does the Security Intelligence Operations (SIO) play in the Cisco SecureX architecture?
Correct
Incorrect
-
Question 14 of 24
14. Question
1 pointsWhat worm mitigation phase involves actively disinfecting infected systems?
Correct
Incorrect
-
Question 15 of 24
15. Question
1 pointsHow is a smurf attack conducted?
Correct
Incorrect
-
Question 16 of 24
16. Question
1 pointsWhat is a characteristic of a Trojan horse as it relates to network security?
Correct
Incorrect
-
Question 17 of 24
17. Question
1 pointsWhat is the first step in the risk management process specified by the ISO/IEC?
Correct
Incorrect
-
Question 18 of 24
18. Question
1 pointsWhat is the significant characteristic of worm malware?
Correct
Incorrect
-
Question 19 of 24
19. Question
1 pointsWhich condition describes the potential threat created by Instant On in a data center?
Correct
Incorrect
-
Question 20 of 24
20. Question
3 pointsWhat are the three core components of the Cisco Secure Data Center solution? (Choose three.)
Correct
Incorrect
-
Question 21 of 24
21. Question
1 pointsA disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?
Correct
Incorrect
-
Question 22 of 24
22. Question
2 pointsWhich two statements describe access attacks? (Choose two.)
Correct
Incorrect
-
Question 23 of 24
23. Question
1 pointsWhat is a ping sweep?
Correct
Incorrect
-
Question 24 of 24
24. Question
1 pointsFill in the blank.
- As a dedicated network security tool, an intrusion (prevention, PREVENTION) system can provide detection and blocking of attacks in real time.
Correct
Incorrect
Leaderboard: CCNA Security v2.0 Chapter 1 Simulator Exam
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||