CCNA Security v2.0 Chapter 3 Simulator Exam Online
CCNA Security v2.0 Exam Training | |
---|---|
Time | 60 minutes |
Questions | 23 |
CCNA Security v2.0 Chapter 3 Simulator Exam
Time limit: 0
Quiz-summary
0 of 23 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
Information
CCNA Security v2.0 Chapter 3 Simulator Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 23 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Your result has been entered into leaderboard
Loading
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- Answered
- Review
-
Question 1 of 23
1. Question
1 pointsBecause of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?
Correct
Incorrect
-
Question 2 of 23
2. Question
1 pointsWhy is authentication with AAA preferred over a local database method?
Correct
Incorrect
-
Question 3 of 23
3. Question
1 pointsWhich authentication method stores usernames and passwords in ther router and is ideal for small networks.
Correct
Incorrect
-
Question 4 of 23
4. Question
1 pointsWhich component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?
Correct
Incorrect
-
Question 5 of 23
5. Question
2 pointsRefer to the exhibit. Router R1 has been configured as shown, with the resulting log message. On the basis of the information that is presented, which two statements describe the result of AAA authentication operation? (Choose two.)
Correct
Incorrect
-
Question 6 of 23
6. Question
1 pointsA user complains about being locked out of a device after too many unsuccessful AAA login attempts. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device?
Correct
Incorrect
-
Question 7 of 23
7. Question
1 pointsA user complains about not being able to gain access to a network device configured with AAA. How would the network administrator determine if login access for the user account is disabled?
Correct
Incorrect
-
Question 8 of 23
8. Question
1 pointsWhen a method list for AAA authentication is being configured, what is the effect of the keywordlocal?
Correct
Incorrect
-
Question 9 of 23
9. Question
1 pointsWhich solution supports AAA for both RADIUS and TACACS+ servers?
Correct
Incorrect
-
Question 10 of 23
10. Question
1 pointsWhat difference exists when using Windows Server as an AAA server, rather than Cisco Secure ACS?
Correct
Incorrect
-
Question 11 of 23
11. Question
1 pointsWhat is a characteristic of TACACS+?
Correct
Incorrect
-
Question 12 of 23
12. Question
2 pointsWhich two features are included by both TACACS+ and RADIUS protocols? (Choose two.)
Correct
Incorrect
-
Question 13 of 23
13. Question
1 pointsWhich server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per-group basis?
Correct
Incorrect
-
Question 14 of 23
14. Question
1 pointsRefer to the exhibit. Which statement describes the configuration of the ports for Server1?
Correct
Incorrect
-
Question 15 of 23
15. Question
1 pointsTrue or False?
The single-connection keyword prevents the configuration of multiple TACACS+ servers on a AAA-enabled router.
Correct
Incorrect
-
Question 16 of 23
16. Question
1 pointsWhy would a network administrator include a local username configuration, when the AAA-enabled router is also configured to authenticate using several ACS servers?
Correct
Incorrect
-
Question 17 of 23
17. Question
1 pointsWhich debug command is used to focus on the status of a TCP connection when using TACACS+ for authentication?
Correct
Incorrect
-
Question 18 of 23
18. Question
1 pointsWhich characteristic is an important aspect of authorization in an AAA-enabled network device?
Correct
Incorrect
-
Question 19 of 23
19. Question
1 pointsWhat is the result of entering the aaa accounting network command on a router?
Correct
Incorrect
-
Question 20 of 23
20. Question
1 pointsWhat is a characteristic of AAA accounting?
Correct
Incorrect
-
Question 21 of 23
21. Question
1 pointsWhen using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?
Correct
Incorrect
-
Question 22 of 23
22. Question
1 pointsWhat device is considered a supplicant during the 802.1X authentication process?
Correct
Incorrect
-
Question 23 of 23
23. Question
1 pointsWhat protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?
Correct
Incorrect
Leaderboard: CCNA Security v2.0 Chapter 3 Simulator Exam
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||