CCNA Security v2.0 Chapter 8 Simulator Exam Online
CCNA Security v2.0 Exam Training | |
---|---|
Time | 60 minutes |
Questions | 27 |
CCNA Security v2.0 Chapter 8 Simulator Exam
Time limit: 0
Quiz-summary
0 of 27 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
Information
CCNA Security v2.0 Chapter 8 Simulator Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 27 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Your result has been entered into leaderboard
Loading
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- Answered
- Review
-
Question 1 of 27
1. Question
1 pointsRefer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?
Correct
Incorrect
-
Question 2 of 27
2. Question
3 pointsWhat three protocols must be permitted through the company firewall for establishment of IPsec site-to-site VPNs? (Choose three.)
Correct
Incorrect
-
Question 3 of 27
3. Question
1 pointsWhich statement describes the effect of key length in deterring an attacker from hacking through an encryption key?
Correct
Incorrect
-
Question 4 of 27
4. Question
1 pointsWhat is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?
Correct
Incorrect
-
Question 5 of 27
5. Question
1 pointsConsider the following configuration on a Cisco ASA:
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
What is the purpose of this command?
Correct
Incorrect
-
Question 6 of 27
6. Question
1 pointsWhich transform set provides the best protection?
Correct
Incorrect
-
Question 7 of 27
7. Question
3 pointsWhich three ports must be open to verify that an IPsec VPN tunnel is operating properly? (Choose three.)
Correct
Incorrect
-
Question 8 of 27
8. Question
1 pointsWhen is a security association (SA) created if an IPsec VPN tunnel is used to connect between two sites?
Correct
Incorrect
-
Question 9 of 27
9. Question
1 pointsIn which situation would the Cisco Discovery Protocol be disabled?
Correct
Incorrect
-
Question 10 of 27
10. Question
2 pointsWhich two statements accurately describe characteristics of IPsec? (Choose two.)
Correct
Incorrect
-
Question 11 of 27
11. Question
1 pointsWhich action do IPsec peers take during the IKE Phase 2 exchange?
Correct
Incorrect
-
Question 12 of 27
12. Question
3 pointsWhich three statements describe the IPsec protocol framework? (Choose three.)
Correct
Incorrect
-
Question 13 of 27
13. Question
1 pointsWhich statement accurately describes a characteristic of IPsec?
Correct
Incorrect
-
Question 14 of 27
14. Question
2 pointsWhich two IPsec protocols are used to provide data integrity?
Correct
Incorrect
-
Question 15 of 27
15. Question
1 pointsWhat is the function of the Diffie-Hellman algorithm within the IPsec framework?
Correct
Incorrect
-
Question 16 of 27
16. Question
1 pointsRefer to the exhibit. What HMAC algorithm is being used to provide data integrity?
Correct
Incorrect
-
Question 17 of 27
17. Question
1 pointsWhat is needed to define interesting traffic in the creation of an IPsec tunnel?
Correct
Incorrect
-
Question 18 of 27
18. Question
1 pointsRefer to the exhibit. What algorithm will be used for providing confidentiality?
Correct
Incorrect
-
Question 19 of 27
19. Question
1 pointsWhich technique is necessary to ensure a private transfer of data using a VPN?
Correct
Incorrect
-
Question 20 of 27
20. Question
1 pointsWhich statement describes a VPN?
Correct
Incorrect
-
Question 21 of 27
21. Question
1 pointsWhich protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
Correct
Incorrect
-
Question 22 of 27
22. Question
1 pointsWhat is the purpose of NAT-T?
Correct
Incorrect
-
Question 23 of 27
23. Question
1 pointsWhich term describes a situation where VPN traffic that is is received by an interface is routed back out that same interface?
Correct
Incorrect
-
Question 24 of 27
24. Question
1 pointsWhat is an important characteristic of remote-access VPNs?
Correct
Incorrect
-
Question 25 of 27
25. Question
1 pointsWhich type of site-to-site VPN uses trusted group members to eliminate point-to-point IPsec tunnels between the members of a group?
Correct
Incorrect
-
Question 26 of 27
26. Question
1 pointsRefer to the exhibit. Which pair of crypto isakmp key commands would correctly configure PSK on the two routers?
Correct
Incorrect
-
Question 27 of 27
27. Question
2 pointsWhich two protocols must be allowed for an IPsec VPN tunnel is operate properly (Choose two.)?
Correct
Incorrect
Leaderboard: CCNA Security v2.0 Chapter 8 Simulator Exam
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||