CCNA Security v2.0 Chapter 11 Simulator Exam Online
CCNA Security v2.0 Exam Training | |
---|---|
Time | 60 minutes |
Questions | 24 |
CCNA Security v2.0 Chapter 11 Simulator Exam
Time limit: 0
Quiz-summary
0 of 24 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
Information
CCNA Security v2.0 Chapter 11 Simulator Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 24 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Your result has been entered into leaderboard
Loading
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- Answered
- Review
-
Question 1 of 24
1. Question
1 pointsWhich security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?
Correct
Incorrect
-
Question 2 of 24
2. Question
1 pointsHow does network scanning help assess operations security?
Correct
Incorrect
-
Question 3 of 24
3. Question
1 pointsWhat is the objective of the governing policy in the security policy hierarchy structure?
Correct
Incorrect
-
Question 4 of 24
4. Question
1 pointsWhich type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?
Correct
Incorrect
-
Question 5 of 24
5. Question
1 pointsWhat is the purpose of a security awareness campaign?
Correct
Incorrect
-
Question 6 of 24
6. Question
1 pointsWhat is the goal of network penetration testing?
Correct
Incorrect
-
Question 7 of 24
7. Question
1 pointsWhat network security testing tool has the ability to provide details on the source of suspicious network activity?
Correct
Incorrect
-
Question 8 of 24
8. Question
1 pointsWhat network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?
Correct
Incorrect
-
Question 9 of 24
9. Question
1 pointsWhat network testing tool can be used to identify network layer protocols running on a host?
Correct
Incorrect
-
Question 10 of 24
10. Question
1 pointsWhat type of network security test would be used by network administrators for detection and reporting of changes to network systems?
Correct
Incorrect
-
Question 11 of 24
11. Question
1 pointsWhat testing tool is available for network administrators who need a GUI version of Nmap?
Correct
Incorrect
-
Question 12 of 24
12. Question
1 pointsWhich initial step should be followed when a security breach is found on a corporate system?
Correct
Incorrect
-
Question 13 of 24
13. Question
1 pointsWhat step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system?
Correct
Incorrect
-
Question 14 of 24
14. Question
1 pointsWhich security program is aimed at all levels of an organization, including end users and executive staff?
Correct
Incorrect
-
Question 15 of 24
15. Question
1 pointsWhat is implemented by administration to instruct end users in how to effectively conduct business safely within an organization?
Correct
Incorrect
-
Question 16 of 24
16. Question
2 pointsWhat are two major components of a security awareness program? (Choose two.)
Correct
Incorrect
-
Question 17 of 24
17. Question
1 pointsWhich type of documents include implementation details that usually contain step-by-step instructions and graphics?
Correct
Incorrect
-
Question 18 of 24
18. Question
1 pointsWhich type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed?
Correct
Incorrect
-
Question 19 of 24
19. Question
1 pointsWhich policy outlines the overall security goals for managers and technical staff within a company?
Correct
Incorrect
-
Question 20 of 24
20. Question
1 pointsWhich type of security policy includes network access standards and server security policies?
Correct
Incorrect
-
Question 21 of 24
21. Question
1 pointsWhich type of security policy includes acceptable encryption methods?
Correct
Incorrect
-
Question 22 of 24
22. Question
1 pointsWhat is the determining factor in the content of a security policy within an organization?
Correct
Incorrect
-
Question 23 of 24
23. Question
1 pointsWhich executive position is ultimately responsible for the success of an organization?
Correct
Incorrect
-
Question 24 of 24
24. Question
3 pointsMatch the network security testing tool with the correct function. (Not all options are used.)
Sort elements
- Tripwire
- Nessus
- Nmap
-
used to access if network devices are compliant with networks security policies
-
used to scan systems for software vulnerabilities
-
Used for Layer 3 port scanning
Correct
Incorrect
Leaderboard: CCNA Security v2.0 Chapter 11 Simulator Exam
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||