Practice Exam 2

Hints and Pointers

If you are preparing for the CCNA Security exam, you already have your CCNA certification, which means you are already an expert at Cisco exams, right? Possibly, but don’t be overconfident. The CCNA Security is most definitely a big step, and although it leverages your basic network knowledge of the CCNA certification, it also introduces new ways of looking at topics that just may force you to go back and re-study large sections of the prerequisite CCNA material. That is why I have included tips throughout the book of CCNA areas that are particularly important to brush up on.

These practice exam questions have been created by the author and reviewed by Cisco technical experts. They are representative of (and possibly a little bit harder than) the questions that you will see in the real exam.

The following are general tips for using the two practice exams in this book:

  • Time yourself: Each sample exam is 50 questions. Try to stay within a 60- minute time limit for each exam.

  • Find a quiet place: You need a place free of distractions to attempt the sample exams. I find a public library is often the best place. Equip yourself with only a notepad and pen, just like the real exam. Oh, and turn off your personal communication device when you’re taking the exam!

  • Practice data dumping: The Cram Sheet at the beginning of this Exam Cram is meant to represent the kind of arcane but important information that is hard to retain. Practice dumping this information from your brain onto the aforementioned notepad just before you sit down to attempt the practice exam.

  • Don’t get beached on a single question: If you don’t know the answer for a question, then choose an answer anyway, recognizing that you don’t get marked down for a wrong answer and that you get no points at all for one that you do not attempt. Take note of the question that stumped you and be prepared to drill down on that topic area later.

  • Don’t be overconfident: If you take the practice exam and ace it, you’re probably ready for the real thing. That said, although these practice exam questions are meant to represent the real exam to the best of this author’s knowledge, you owe it to yourself to at least read every chapter in its entirety to obtain the complete context for every topic area. Use the exams to identify topics you struggle with consistently and brush up on them.

  • Practice, practice, practice: Keep on taking the practice exams until you obtain a perfect score on both of them. Book your exam appointment. You’re ready!

So in the end, I have these pieces of advice: Study hard and practice, practice, practice!

I wish you good luck, too. But remember, sometimes you have to be good to be lucky.

—Eric Stewart

Practice Exam #2

1.

Implementing network security is often described as a balancing act between three competing needs. Choose these needs from the following:

Practice Exam #2

A.

Evolving business requirements

Practice Exam #2

B.

Freedom of information initiatives

Practice Exam #2

C.

Personal safety

Practice Exam #2

D.

Physical plant security

Practice Exam #2

E.

Protection of data

2.

Fill in the blank. A disturbing recent trend has been what Cisco calls ______ threats, which focus on the application layer of the OSI model.

Practice Exam #2

A.

External

Practice Exam #2

B.

Internal

Practice Exam #2

C.

Custom

Practice Exam #2

D.

Hacker

Practice Exam #2

E.

None of the above.

3.

What are the three broad categories of security controls?

Practice Exam #2

A.

User education

Practice Exam #2

B.

Firewalls

Practice Exam #2

C.

Administrative

Practice Exam #2

D.

Physical

Practice Exam #2

E.

Technical

4.

True or false. Hackers are known for thinking “inside the box” because their integral understanding of a system’s inner workings make them uniquely able to exploit weaknesses in design.

5.

Which of the following are not considered attacks against availability? (Choose all that apply.)

Practice Exam #2

A.

SYN floods

Practice Exam #2

B.

MAC flooding

Practice Exam #2

C.

Social engineering

Practice Exam #2

D.

Dumpster diving

Practice Exam #2

E.

DoS

6.

Fill in the blanks in the quantitative risk analysis formula with the missing variables. (Choose two; the order makes no difference.)

ALE = (AV * EF) * ARO

Practice Exam #2

A.

Asset Value (AV)

Practice Exam #2

B.

Exposure Factor (EF)

Practice Exam #2

C.

Single Loss Expectancy (SLE)

Practice Exam #2

D.

Rate of Functional Loss (ROFL)

Practice Exam #2

E.

Return on Investment (ROI)

7.

Network security testing is considered an important part of assessing a network’s resilience against attacks and establishing the requirement for security controls (physical, administrative, and technical). Which of the following is not a goal of network security testing?

Practice Exam #2

A.

Create a baseline for corrective action.

Practice Exam #2

B.

Define ways to mitigate discovered vulnerabilities.

Practice Exam #2

C.

Create a baseline of an organization’s current security measures.

Practice Exam #2

D.

Measure an organization’s progress in fulfilling security policy.

Practice Exam #2

E.

Analyze the relative cost vs. benefit of security improvements.

Practice Exam #2

F.

None of the above.

8.

Some of the items in the following list represent categories of disruption. Identify the three correct categories of disruption by putting them in order from least disruptive to most disruptive:

Practice Exam #2

A.

Catastrophe

Practice Exam #2

B.

Disaster

Practice Exam #2

C.

Nondisaster

Practice Exam #2

D.

Cataclysm

Practice Exam #2

E.

Armageddon

9.

What are the three main groups of stakeholders in a security policy?

Practice Exam #2

A.

Senior management, security staff, end users

Practice Exam #2

B.

Senior management, law enforcement agencies, IT staff

Practice Exam #2

C.

Law enforcement agencies, customers, security staff

Practice Exam #2

D.

Senior management, security staff, the public

Practice Exam #2

E.

None of the above.

10.

Which of the following Cisco products cannot be managed by the Cisco Security Manager?

Practice Exam #2

A.

ASA 5500 Series Adaptive Security Appliances

Practice Exam #2

B.

Catalyst 6500 Series switches

Practice Exam #2

C.

PIX 500 series Security Appliances

Practice Exam #2

D.

Cisco 4200 Series Sensors

Practice Exam #2

E.

None of the above.

11.

In the following figure, what do scenarios 1, 2, and 3 represent, respectively?

Practice Exam #2

Practice Exam #2

A.

Two perimeters, single perimeter, screened subnet

Practice Exam #2

B.

Screened subnet, single perimeter, two perimeters

Practice Exam #2

C.

Single perimeter, two perimeters, screened subnet

Practice Exam #2

D.

Single DMZ, double DMZ, triple DMZ

Practice Exam #2

E.

None of the above.

12.

True or false. The service password-encryption command encrypts all the passwords on the device with the exception of the enable secret, which uses a hash.

13.

Views are very useful in creating role-based rules as to which commands are authorized for execution. Examine the sequence of commands and choose all the correct statements from the list that follows them.

CiscoISR(config)#aaa new-model
CiscoISR#enable view
Password: enablesecretpassword
CiscoISR#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
CiscoISR(config)#parser view ISP
CiscoISR(config-view)#secret 0 hardtoguess
CiscoISR(config-view)#commands exec include ping
CiscoISR(config-view)#commands exec include all configure


Practice Exam #2

A.

The aaa new-model command is required before a view can be created.

Practice Exam #2

B.

The user who accesses the ISP view will require the password hardtoguess.

Practice Exam #2

C.

The user who accesses the ISP view will be authorized to use the ping command.

Practice Exam #2

D.

The user who accesses the ISP view will not be authorized to use the copy running-config startup-config command.

Practice Exam #2

E.

None of the above.

14.

With respect to AAA, access to the router is called remote ________ access and access through the router is called remote ________ access. (Pick the answer that fills in the blanks in the correct order.)

Practice Exam #2

A.

Network, administrative

Practice Exam #2

B.

Vty, packet

Practice Exam #2

C.

Administrative, network

Practice Exam #2

D.

Proxy, cut-through

Practice Exam #2

E.

None of the above.

15.

What are the three main task areas for setting up external AAA? Choose from the following list:

Practice Exam #2

A.

Set up users (server).

Practice Exam #2

B.

Configure the AAA network (client and server).

Practice Exam #2

C.

Install AAA 802.1X supplicant support in SDM (client).

Practice Exam #2

D.

Identify traffic to which AAA will be applied (client).

Practice Exam #2

E.

Choose digital certificates to authenticate the AAA server to the client (and vice versa).

16.

With respect to secure management and reporting, traffic can flow either ________, meaning that it is separate from the production network, or ________, meaning that the traffic flows across the production network. (Pick the answer that fills in the blanks in the correct order.)

Practice Exam #2

A.

Extranet, intranet

Practice Exam #2

B.

Intranet, extranet

Practice Exam #2

C.

Internet, intranet

Practice Exam #2

D.

Out-of-band, in-band

Practice Exam #2

E.

In-band, out-of-band

17.

For the following names of Cisco log severity levels, fill in their level:

Names:

Errors __

Informational __

Alerts __

Emergencies __

Debugging __

Warnings __

Notifications __

Critical __

18.

Choose the statement that best describes what is being represented in the following figure.

Practice Exam #2

Practice Exam #2

A.

SSH is enabled system wide on the router, and a user should now be able to SSH to any interface.

Practice Exam #2

B.

SSH is enabled on the router, but has to be separately enabled on the vty lines.

Practice Exam #2

C.

SSH is not enabled on the router until the Save button is pressed.

Practice Exam #2

D.

SSH is not enabled on the router until the Refresh button is pressed.

Practice Exam #2

E.

SSH is enabled on the router, but has to be separately enabled on the physical interfaces (Ethernet, serial, and so on).

Practice Exam #2

F.

None of the above.

19.

What are the Cisco AutoSecure features that SDM Security Audit does not implement? (Choose all that apply.)

Practice Exam #2

A.

Disabling NTP

Practice Exam #2

B.

Configuring AAA

Practice Exam #2

C.

Setting Selective Packet Discard (SPD) values

Practice Exam #2

D.

Enabling TCP intercepts

Practice Exam #2

E.

Configuring anti-spoofing ACLs on outside-facing interfaces

Practice Exam #2

F.

All of the above.

20.

What are the two parameters that have to be configured before RSA keys can be generated to support SSH on the router?

Practice Exam #2

A.

Hostname, domain name

Practice Exam #2

B.

Enable secret, SSH transport on the vtys

Practice Exam #2

C.

Enable password, SSH transport on physical interfaces

Practice Exam #2

D.

Hostname, default gateway

Practice Exam #2

E.

Encryption key protocol, hashing method

21.

Which of the following is Cisco’s definition of a firewall?

Practice Exam #2

A.

A firewall is a system or a group of systems that enforce an access control policy between two networks.

Practice Exam #2

B.

A firewall is a stateful device that analyzes the state of a connection built across it and opens and closes ports in support of secure communication.

Practice Exam #2

C.

A firewall is a device that filters packets, both in the ingress and egress direction, based on static packet header content.

Practice Exam #2

D.

A firewall is software deployed on an end system to protect a specific application.

Practice Exam #2

E.

None of the above.

22.

Match the following firewall types with the letter corresponding to the layers of the TCP/IP protocol stack at which they operate:

Firewall Types

1. Static packet-filtering firewall

__

2. Application layer gateway

__

3. Dynamic (or stateful) packet-filtering firewall

__

4. Application inspection firewall

__

5. Transparent firewall

__

TCP/IP Layers

A. 1 to 4

B. 1 to 5

C. 1 to 2

23.

True or false. Assuming that the IOS router is also the VPN endpoint, encrypted packets are tested on an inbound ACL twice.

24.

Fill in the blanks. Interface ACLs are still relevant and can be used to complement Zone-Based Policy Firewall (ZPF) policies. Inbound ACLs are applied ________ ZPF policies and outbound ACLs are applied ________ ZPF policies.

25.

Examine the figure and answer the subsequent question.

Practice Exam #2

True or false. The traffic from Vlan 2 to FastEthernet4 (Fa 4) will be forwarded.

26.

What is the area of the largest vulnerability in modern cryptosystems?

Practice Exam #2

A.

Ciphers

Practice Exam #2

B.

Hashes

Practice Exam #2

C.

VPN endpoints

Practice Exam #2

D.

Users

Practice Exam #2

E.

Encryption keys

27.

Fill in the blank. You are asked to implement a new cryptosystem that uses ciphers to provide for confidentiality of data transmitted. Researching industry data, you decide to use 3DES and not AES because 3DES ________.

Practice Exam #2

A.

Is cryptographically stronger.

Practice Exam #2

B.

Uses longer keys.

Practice Exam #2

C.

Is more trusted.

Practice Exam #2

D.

Is less computationally intensive.

Practice Exam #2

E.

None of the above.

28.

True or false. Modern SSL VPNs use Transmission Level Security (TLS) instead of Secure Sockets Layer (SSL) because it is a newer, standards-based replacement for SSL.

29.

In a typical asymmetric key cryptosystem, node A will encrypt messages with the node B’s ________ and will decrypt messages from node B using node A’s own ________. Safeguarding the ________ is essential. (Pick the answers that fill in the blanks in the correct order; choices can be reused.)

Practice Exam #2

A.

Private key

Practice Exam #2

B.

Public key

30.

Which of the following represent common Cisco applications of certificate-based authentication?

Practice Exam #2

A.

SSL VPN servers

Practice Exam #2

B.

TN3270 over SSL

Practice Exam #2

C.

802.1X using EAP-TLS

Practice Exam #2

D.

IPsec VPNs

Practice Exam #2

E.

None of the above.

31.

What are the two main categories of VPN?

Practice Exam #2

A.

Dynamic multipoint (DMVPN)

Practice Exam #2

B.

Client-Server

Practice Exam #2

C.

Site-to-site

Practice Exam #2

D.

Remote-access

Practice Exam #2

E.

Full mesh

32.

True or false. In IPsec VPNs, Internet Key Exchange (IKE) Phase I carries data, and IKE Phase II exists only to negotiate and authenticate, but does not carry data.

33.

Fill in the blanks in the following description of IKE Phase I negotiations.

The separate elements of IKE Phase I negotiation are grouped in a ________. During IKE Phase I, either main mode or ________ may be chosen to perform negotiations. When this negotiation is complete, some vendors use their own proprietary negotiation protocol to negotiate additional parameters. Cisco’s proprietary protocol for remote-access IPsec VPNs is called ________. After Phase I is complete, ________ negotiates the IKE Phase II parameters.

Choices:

Practice Exam #2

A.

Policy set

Practice Exam #2

B.

Transform set

Practice Exam #2

C.

Aggressive mode

Practice Exam #2

D.

Mode configuration

Practice Exam #2

E.

Quick mode

Practice Exam #2

F.

Active mode

34.

Examine the following commands:

CiscoISR-A(config)#crypto isakmp policy 99
CiscoISR-A(config-isakmp)#hash sha
CiscoISR-A(config-isakmp)#authentication pre-share
CiscoISR-A(config-isakmp)#group 5
CiscoISR-A(config-isakmp)#lifetime 86400
CiscoISR-A(config-isakmp)#encryption aes
CiscoISR-A(config-isakmp)#


Which statements are correct with respect to these commands? (Choose all that apply.)

Practice Exam #2

A.

A site-to-site tunnel group, number 5, is being created.

Practice Exam #2

B.

The VPN peers will authenticate using a pre-shared key (PSK).

Practice Exam #2

C.

The separate policy elements are being grouped as policy set 99.

Practice Exam #2

D.

The Advanced Enterprise Security (AES) encryption algorithm is specified.

Practice Exam #2

E.

128-bit Advanced Encryption Standard (AES) encryption algorithm is specified.

35.

Examine the figure. It is a screenshot showing the summary of a VPN created with the Cisco SDM Site-to-Site VPN Wizard.

Practice Exam #2

Which statements are correct with respect to the figure? (Choose all that apply.)

Practice Exam #2

A.

PSKs are used for authentication.

Practice Exam #2

B.

One IKE Phase I policy indicates SHA-HMAC with DH group 2, and 3DES for the cipher.

Practice Exam #2

C.

One IKE Phase II policy indicates SHA-HMAC with DH group 2, and 3DES for the cipher.

Practice Exam #2

D.

One IKE Phase I transform set indicates that ESP will be used with an AES 128-bit cipher and integrity uses SHA-HMAC.

Practice Exam #2

E.

All the traffic between 192.168.0.0/24 to 10.0.20.0/24 will be protected by the IPsec tunnel.

36.

Which of the following are examples of Cisco IDS or IPS solutions? (Choose all that apply.)

Practice Exam #2

A.

AIP-SSM module for ASA 5500 Series security appliances

Practice Exam #2

B.

IOS IPS

Practice Exam #2

C.

HIPS

Practice Exam #2

D.

4200 Series sensors

Practice Exam #2

E.

IPS AIM

37.

Match the types of IPS alarms below with their descriptions:

IPS Alarms:

1.

False positive

__

2.

False negative

__

3.

True positive

__

4.

True negative

__

Descriptions:

Practice Exam #2

A.

Normal traffic or a non-malicious action causes the signature to fire.

Practice Exam #2

B.

An attack is properly detected by the IPS.

Practice Exam #2

C.

An attack is not detected by the IPS.

Practice Exam #2

D.

The signature doesn’t fire on traffic that it’s not supposed to.

38.

What are the three main detection technologies that the Cisco IOS IPS employs?

Practice Exam #2

A.

Protocol analysis-based

Practice Exam #2

B.

Signature-based

Practice Exam #2

C.

Predictive algorithm protocol (PAP)-based

Practice Exam #2

D.

Stochastic interpolation statistical anomaly

Practice Exam #2

E.

Profile-based

39.

True or false. Cisco recommends that the alert level of any signature should be set to the severity level of the signature, both for the included signature as well as for created signatures.

40.

Which CLI command verifies all Cisco IOS IPS settings?

Practice Exam #2

A.

show ip ips configuration all

Practice Exam #2

B.

show ip ips all

Practice Exam #2

C.

show ips all

Practice Exam #2

D.

show ips configuration all

Practice Exam #2

E.

None of the above.

41.

What are the three prongs of Cisco’s Host Security Strategy?

Practice Exam #2

A.

Perimeter security

Practice Exam #2

B.

End-user security

Practice Exam #2

C.

Endpoint protection

Practice Exam #2

D.

Cisco Network Admission Control (NAC)

Practice Exam #2

E.

Network infection containment

42.

What is Cisco’s solution for preventing a buffer overflow attack?

Practice Exam #2

A.

Storm control

Practice Exam #2

B.

IOS IPS

Practice Exam #2

C.

Network Admission Control (NAC)

Practice Exam #2

D.

Cisco Security Agent (CSA)

Practice Exam #2

E.

Trend Micro attack signatures

43.

Match the following interceptors that CSA employs with their definitions:

Terms:

1.

Network interceptor

__

2.

Execution space interceptor

__

3.

File system interceptor

__

4.

Configuration interceptor

__

Definitions:

A. All file read/write requests are intercepted and permitted or denied based on the security policy.

B. Stymies DoS attacks by limiting the number of connections that can be made in a specified period.

C. Examines read/write requests to system configuration files.

D. Ensures that each application is only allowed write access to memory that it owns.

44.

What is the main strategy for securing access to SANs?

Practice Exam #2

A.

VLANs

Practice Exam #2

B.

VSANs

Practice Exam #2

C.

Zoning

Practice Exam #2

D.

ZPF

Practice Exam #2

E.

Physical security

45.

Which of the following Cisco Unified Communications Manager (UCM) features can protect the VoIP network against fraud? (Choose all that apply.)

Practice Exam #2

A.

Partitioning

Practice Exam #2

B.

Dial Plans

Practice Exam #2

C.

Forced Authorization Codes (FACs)

Practice Exam #2

D.

VVLANs (Voice VLANs)

Practice Exam #2

E.

Anti-Vishing Agent (AVA)

46.

What statement best describes a VLAN hopping attack in general terms?

Practice Exam #2

A.

An attacker tricks a switch into routing traffic to a different IP subnet than the subnet to which the VLAN 1 interface is assigned in the management domain.

Practice Exam #2

B.

An attacker tricks a switch into allowing traffic to hop to a different VLAN than the VLAN that is assigned to the port to which they are connected.

Practice Exam #2

C.

An attacker tricks the switch into allowing an attack to propagate to the Internet VLAN.

Practice Exam #2

D.

An attacker tricks the switch into dynamically assigning the attacker a VLAN ID to which they are not entitled via VTP (VLAN Trunking Protocol) and turn off trunking between all switches.

Practice Exam #2

E.

An attacker tricks the switch into turning off traffic to the Internet VLAN, thus creating a DoS for all users whose traffic is destined to the Internet.

47.

True or false. The best way to prevent a double-tagging VLAN hopping attack is to make sure that the native VLAN of the trunked ports is different than any of the users’ ports.

48.

Examine the following commands and answer the subsequent question.

Catalyst1(config-if)#switchport mode access
Catalyst1(config-if)#switchport port-security
Catalyst1(config-if)#switchport port-security maximum 30
Catalyst1(config-if)#switchport port-security violation shutdown vlan 5


Which of the following statements about this series of commands is correct? (Choose all that apply.)

Practice Exam #2

A.

Port security will be performed for a maximum of 30 learned MAC addresses; thereafter, it will be disabled.

Practice Exam #2

B.

Port security will be enabled for a maximum of 30 seconds on any one MAC address.

Practice Exam #2

C.

Only the first 30 MAC addresses in VLAN 5 learned on this switch port will be able to use the port.

Practice Exam #2

D.

When the 31st MAC address in VLAN 5 tries to use this port, the switch port will be administratively disabled.

Practice Exam #2

E.

None of the above.

49.

Which commands do you use to verify that port security is configured and operational on an interface? (Choose two.)

Practice Exam #2

A.

show interface port-security address

Practice Exam #2

B.

show port-security interface interface-id address

Practice Exam #2

C.

show port-security address

Practice Exam #2

D.

show interface

Practice Exam #2

E.

show mac-address-table interface interface-id

50.

Which of the following interface configuration commands set the native VLAN of a trunk to 10?

Practice Exam #2

A.

switchport native vlan 10 trunkport

Practice Exam #2

B.

switchport trunk mode native vlan 10

Practice Exam #2

C.

switchport trunk native vlan 10

Practice Exam #2

D.

switchport-native trunk 10

Practice Exam #2

E.

switchport-trunk native 10

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset