10
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM] RECENTLY WRITTEN Disable w3 Total Cache Plugin Completely Unable to Connect to Internet Eset Smart Security Atheros AR5007EG Windows 7 Driver Network Security Chapter 4 Packet Tracer Activity A Answer Answer CCNA Security Chapter 10 Test – CCNAS v1.1 COFFEE FOR ME SEARCH Answer CCNA Security Chapter 6 Test – CCNAS v1.1 This post is about answer for CCNA Security Chapter 6 Test. The questions displayed in this post are based on CCNAS v1.1. All the answers has been confirmed to be 100% correct. With this Posted on August 4, 2012 FirePlotter A real-time bandwidth monitor for Cisco and FortiNet firewalls www.fireplotter.com AGT International A Global Provider of Advanced Safety and Security Solutions www.agtinternational.com X.25 Network Conversion Best Value for X.25-TCP/IP Gateways Supports XOT, SVC, PVC, SNMP & LAPB www.microtronix.com Free CNA Exam Questions Exam Questions Practice Flash Cards Medical Assistant Vocabulary Cards www.cnatutor.org Home Category Search Sitemap Contact Us About VMware Courses-Free Exams VMware and Zimbra training courses Register today and become a VCP www.alfavad.com

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Embed Size (px)

Citation preview

Page 1: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

RECENTLY WRITTEN

Disable w3 TotalCache PluginCompletelyUnable to Connectto Internet EsetSmart SecurityAtheros AR5007EGWindows 7 DriverNetwork SecurityChapter 4 PacketTracer Activity AAnswerAnswer CCNASecurity Chapter 10Test – CCNAS v1.1

COFFEE FOR ME

SEARCH

Answer CCNA SecurityChapter 6 Test –CCNAS v1.1

This post is about answer for CCNA Security Chapter 6 Test. Thequestions displayed in this post are based on CCNAS v1.1. All theanswers has been confirmed to be 100% correct. With this

Posted on August 4, 2012

FirePlotterA real-time bandwidth monitor for Cisco andFortiNet firewallswww.fireplotter.com

AGT InternationalA Global Provider of Advanced Safety andSecurity Solutionswww.agtinternational.com

X.25 Network ConversionBest Value for X.25-TCP/IP Gateways SupportsXOT, SVC, PVC, SNMP & LAPBwww.microtronix.com

Free CNA Exam QuestionsExam Questions Practice Flash Cards MedicalAssistant Vocabulary Cardswww.cnatutor.org

Home Category Search Sitemap Contact Us About

VMware Courses-Free ExamsVMware and Zimbra training courses Register today and become a VCP

www.alfavad.com

http://www.google.com/url?ct=abg&q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/%26gl%3DBG%26hl%3Den%26client%3Dca-pub-8983609636255725%26ai0%3DCMdzS4rGRUN7hLoPZ_Abp2YGIB9rB84YC0sK8rRjAjbcBEAEgpLPCKSgEUPO20MsEYOXIWsgBAakCIsbvTVoPuz6oAwHIA98EqgSbAU_QnRnSY-X4qn-KaBv4efRmlGpCBDdVCoA6TtOkRamBLylfPwsPuM91OalD8WHlm4jM0IhMQ8FKiJrwSCD5kfcCWwmsgMRKw4VRf3CuF_4V95xHbU5dGXsBAw_m23p_i9NMnQxG5qtTlYd7ySKuAmpk1EWu_Cti936i3IVsSnc3hp8JbvlEOYhieaxJuNh2jssWPLufn0NxDsph%26ai1%3DCRNE_4rGRUN7hLoPZ_Abp2YGIB_rej70Bko63yyDAjbcBEAIgpLPCKSgEUI--1ov4_____wFg5chayAEBqAMByAPfBKoEmAFP0L0UyGPm-Kp_imgb-Hn0ZpRqQgQ3VQqAOk7TpEWpgS8pXz8LD7jPdTmpQ_Fh5ZuIzNCITEPBSoia8Egg-ZH3AlsJrIDESsOFUX9wrhf-FfecR21OXRl7AQMP5tt6f4vTTJ0MRuarU5WHe8kirgJqZNRFrvwrYvd-otztbfyd3DLXCW5rrs9TYoyvj03bsnvIBty9C7HHxA%26ai2%3DCTT_S4rGRUN7hLoPZ_Abp2YGIB7m1qNwBscWQgyPAjbcBEAMgpLPCKSgEUOOq0o0GYOXIWqABn-mO_wPIAQGoAwHIA98EqgSaAU_Q_S3WY-f4qn-KaBv4efRmlGpCBDdVCoA6TtOkRamBLylfPwsPuM91OalD8WHlm4jM0IhMQ8FKiJrwSCD5kfcCWwmsgMRKw4VRf3CuF_4V95xHbU5dGXsBAw_m23p_i9NMnQxG5qtTlYd7ySKuAmpk1EWu_Cti936i3IVsSnc3hp8JbvlEOYhieaxJuNh2jssWPLufn0MSWhCIBgE%26ai3%3DCJJxg4rGRUN7hLoPZ_Abp2YGIB9nT-bMEwf2e5E7AjbcBEAQgpLPCKSgEUMe9rPL5_____wFg5chayAEBqAMByAPfBKoEmAFP0M0R2mPg-Kp_imgb-Hn0ZpRqQgQ3VQqAOk7TpEWpgS8pXz8LD7jPdTmpQ_Fh5ZuIzNCITEPBSoia8Egg-ZH3AlsJrIDESsOFUX9wrhf-FfecR21OXRl7AQMP5tt6f4vTTJ0MRuarU5WHe8kirgJqZNRFrvwrYvd-otztbfyd3DLXCW5rrs9TYoyvj03bsnvIBty9Lsbp9A&usg=AFQjCNHsVXzClqYPy1tkDsA38_TjsyndwA
Page 2: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

InvisibleAlgorithmonFacebook

105 peoplelike

Like

Facebook social plugin

+6

Follow

Find us on Google+

CCNA SECURITY

Chapter 1Chapter 2Chapter 3Chapter 4Chapter 5

solution, hopefully it will be a good reference for all of us.

As a recommended practice for Layer 2 security, how should VLAN1 be treated?

All access ports should be assigned to VLAN 1.

All trunk ports should be assigned to VLAN 1.

VLAN 1 should be used for management traffic.

VLAN 1 should not be used.

With IP voice systems on data networks, which two types ofattacks target VoIP specifically? (Choose two.)

CoWPAtty

Kismet

SPIT

virus

vishing

Which option best describes a MAC address spoofing attack?

An attacker gains access to another host and masquerades as therightful user of that device.

An attacker alters the MAC address of his host to matchanother known MAC address of a target host.

An attacker alters the MAC address of the switch to gain accessto the network device from a rogue host device.

An attacker floods the MAC address table of a switch so that theswitch can no longer filter network access based on MAC

Page 3: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Chapter 6Chapter 7Chapter 8Chapter 9Chapter 10Final Exam

RANDOM TERMS

matlab code forfiltering maskpt activity 8 6 1 ccnaskills integrationchallenge instructorccna securitychapter 3 v1 1mysql port ändernxamppt is an accuratedescription of CHAPwhen used with PPPon a serial

addresses.

Which attack relies on the default automatic trunkingconfiguration on most Cisco switches?

LAN storm attack

VLAN hopping attack

STP manipulation attack

MAC address spoofing attack

Which two measures are recommended to mitigate VLAN hoppingattacks? (Choose two.)

Use a dedicated native VLAN for all trunk ports.

Place all unused ports in a separate guest VLAN.

Disable trunk negotiation on all ports connecting toworkstations.

Enable DTP on all trunk ports.

Ensure that the native VLAN is used for management traffic.

Which three are SAN transport technologies? (Choose three.)

Fibre Channel

SATA

iSCSI

IP PBX

FCIP

Page 4: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

connection betweentwo routers?

IDE

Refer to the exhibit. What action will the switch take when themaximum number of secure MAC addresses has reached theallowed limit on the Fa0/2 port?

Packets with unknown source addresses are dropped, butnotification of the dropped packets is sent.

The VLAN that Fa0/2 is on is set to error-disabled and all trafficon the VLAN is stopped.

The interface immediately becomes error-disabled and the portLED is turned off.

Packets with unknown source addresses are dropped withoutnotification.

Which software tool can a hacker use to flood the MAC addresstable of a switch?

macof

Cisco CCP

kiwi syslog server

protocol analyzer

Which two methods are used to mitigate VLAN attacks? (Choosetwo.)

enabling port security on all trunk ports

Page 5: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

using a dummy VLAN for the native VLAN

implementing BPDU guard on all access ports

disabling DTP autonegotiation on all trunk ports

using ISL instead of 802.1q encapsulation on all trunk interfaces

Which three switch security commands are required to enable portsecurity on a port so that it will dynamically learn a single MACaddress and disable the port if a host with any other MAC addressis connected? (Choose three.)

switchport mode access

switchport mode trunk

switchport port-security

switchport port-security maximum 2

switchport port-security mac-address sticky

switchport port-security mac-address mac-address

What is an example of a trusted path in an operating system?

digital certificate

digital signature

hash message authentication

Ctrl-Alt-Delete key sequence

Why are traditional network security perimeters not suitable forthe latest consumer-based network endpoint devices?

These devices are not managed by the corporate IT department.

Page 6: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

These devices are more varied in type and are portable.

These devices connect to the corporate network through publicwireless networks.

These devices pose no risk to security as they are not directlyconnected to the corporate network.

Which Cisco IronPort appliance would an organization install tomanage and monitor security policy settings and audit information?

C-Series

M-Series

S-Series

SenderBase-Series

Which Cisco IronPort appliance would an organization install toprotect against malware?

C-Series

M-Series

S-Series

SenderBase-Series

What is the goal of the Cisco NAC framework and the Cisco NACappliance?

to ensure that only hosts that are authenticated and have hadtheir security posture examined and approved are permittedonto the network

to monitor data from the company to the ISP in order to build a

Page 7: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

real-time database of current spam threats from both internaland external sources

to provide anti-malware scanning at the network perimeter forboth authenticated and non-authenticated devices

to provide protection against a wide variety of web-based threats,including adware, phishing attacks, Trojan horses, and worms

When the Cisco NAC appliance evaluates an incoming connectionfrom a remote device against the defined network policies, whatfeature is being used?

authentication and authorization

posture assessment

quarantining of noncompliant systems

remediation of noncompliant systems

Which command is used to configure the PVLAN Edge feature?

switchport block

switchport nonnegotiate

switchport protected

switchport port-security violation protect

Which statement is true about a characteristic of the PVLANEdge feature on a Cisco switch?

All data traffic that passes between protected ports must beforwarded through a Layer 2 device.

All data traffic that passes between protected ports must beforwarded through a Layer 3 device.

Page 8: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Only broadcast traffic is forwarded between protected ports.

Only unicast traffic is forwarded between protected ports.

What is the default configuration of the PVLAN Edge feature on aCisco switch?

All active ports are defined as protected.

All ports are defined as protected.

No ports are defined as protected.

EtherChannel groups are defined as protected ports.

Under which circumstance is it safe to connect to an open wirelessnetwork?

The connection utilizes the 802.11n standard.

The device has been updated with the latest virus protectionsoftware.

The connection is followed by a VPN connection to a trustednetwork.

The user does not plan on accessing the corporate network whenattached to the open wireless network.

As stated earlier, all this answers has been verified to be 100%correct. If you found any wrong answers provided, please leavecomment below. We do appreciate all the corrections that youmade. If you want to contribute for new question or any latestversion of chapter test and exam question, please let me know. Wedo appreciate it too.

Credit: The answer in this chapter test has been provided by Xase.All credit goes to him.

Page 9: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

ONE THOUGHT ON “ANSWER CCNA SECURITY CHAPTER 6 TEST – CCNAS V1.1”

This entry was posted in Data Network, Network Security and tagged 2012,Answer, CCNA Security, CCNA Security Chapter 6 Answer, CCNASecurity Chapter 6 Test, CCNAS Chapter 6 Test, CCNAS v1.1, Chapter6 Test, Solution, Solution CCNA Security Chapter 6 by InviAlgo. Bookmarkthe permalink.

Vpn Connection Hosts Water Filter

emanuel on August 4, 2012 at 11:19 PM

said:

Millones de gracias!. Me has salvado deun gran aprieto. La mejor pagina deTODAS!.

Reply ↓

Leave a ReplyYour email address will not be published. Requiredfields are marked *

Name *

Email *

Website

Comment

Page 10: Answer CCNA Security Chapter 6 Test – CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Search Invisible Algorithm:ccna security chapter 6 exam answers, ccna security chapter 6answers, as a recommended practice for layer 2 security how shouldvlan 1 be treated?, pt activity layer 2 security answer, why aretraditional network security perimeters not suitable for the latestconsumer-based network endpoint devices?, Which command is usedto configure the PVLAN Edge feature?, ccnas chapter 6, Under whichcircumstance is it safe to connect to an open wireless network?,Which Cisco IronPort appliance would an organization install to protectagainst malware?, what is an example of a trusted path in anoperating system?

All

Notify me of followup

comments via e-mail. You

can also subscribe without commenting.