Category: CCNA Security v2.0

CCNA Security v2.0 Final Exam Answers 100%

CCNA Security v2.0 Final Exam Answers 1. Refer to the exhibit. Based on the security levels of the interfaces on ASA1, what traffic will be allowed on the interfaces? Traffic from the Internet and LAN can access the DMZ. Traffic from the Internet and DMZ can access the …

CCNA Security v2.0 Chapter 11 Exam Answers

1. Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets? vulnerability scanning* network scanning integrity checkers penetration testing   2. How does network scanning help assess operations security? It can simulate attacks from malicious sources. It can log abnormal …

CCNA Security v2.0 Chapter 10 Exam Answers

1. Which statement describes the function provided to a network administratorwho uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application? The administrator can connect to and manage a single ASA.* The administrator can connect to and manage multiple ASA devices. …

CCNA Security 2.0 PT Practice SA Part 1 Answers

CCNA Security 2.0 PT Practice SA – Part 1 A few things to keep in mind while completing this activity: Do not use the browser Back button or close or reload any exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. …

CCNA Security v2.0 Chapter 9 Exam Answers

1. Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario …

CCNA Security v2.0 Chapter 8 Exam Answers

1. Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router? It will be sent unencrypted.* It will be sent encrypted. It will be blocked. It will be discarded.   2. What three protocols must be …

CCNA Security v2.0 Chapter 7 Exam Answers

1. What is the focus of cryptanalysis? hiding secret codes developing secret codes breaking encrypted codes* implementing encrypted codes   2. How many bits does the Data Encryption Standard (DES) use for data encryption? 40 bits 56 bits* 64 bits 72 bits   3. Which statement describes the …

CCNA Security v2.0 Chapter 6 Exam Answers

1. Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown? The connection between S1 and PC1 is via a crossover …

CCNA Security v2.0 Chapter 5 Exam Answers

1. What information must an IPS track in order to detect attacks matching a composite signature? the total number of packets in the attack the attacking period used by the attacker the network bandwidth consumed by all packets the state of packets related to the attack*   2. …

CCNA Security v2.0 Chapter 4 Exam Answers

1. Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet? The initial packet is dropped, but subsequent packets …