Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
RECENTLY WRITTEN
Disable w3 TotalCache PluginCompletelyUnable to Connectto Internet EsetSmart SecurityAtheros AR5007EGWindows 7 DriverNetwork SecurityChapter 4 PacketTracer Activity AAnswerAnswer CCNASecurity Chapter 10Test – CCNAS v1.1
COFFEE FOR ME
SEARCH
Answer CCNA SecurityChapter 6 Test –CCNAS v1.1
This post is about answer for CCNA Security Chapter 6 Test. Thequestions displayed in this post are based on CCNAS v1.1. All theanswers has been confirmed to be 100% correct. With this
Posted on August 4, 2012
FirePlotterA real-time bandwidth monitor for Cisco andFortiNet firewallswww.fireplotter.com
AGT InternationalA Global Provider of Advanced Safety andSecurity Solutionswww.agtinternational.com
X.25 Network ConversionBest Value for X.25-TCP/IP Gateways SupportsXOT, SVC, PVC, SNMP & LAPBwww.microtronix.com
Free CNA Exam QuestionsExam Questions Practice Flash Cards MedicalAssistant Vocabulary Cardswww.cnatutor.org
Home Category Search Sitemap Contact Us About
VMware Courses-Free ExamsVMware and Zimbra training courses Register today and become a VCP
www.alfavad.com
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
InvisibleAlgorithmonFacebook
105 peoplelike
Like
Facebook social plugin
+6
Follow
Find us on Google+
CCNA SECURITY
Chapter 1Chapter 2Chapter 3Chapter 4Chapter 5
solution, hopefully it will be a good reference for all of us.
As a recommended practice for Layer 2 security, how should VLAN1 be treated?
All access ports should be assigned to VLAN 1.
All trunk ports should be assigned to VLAN 1.
VLAN 1 should be used for management traffic.
VLAN 1 should not be used.
With IP voice systems on data networks, which two types ofattacks target VoIP specifically? (Choose two.)
CoWPAtty
Kismet
SPIT
virus
vishing
Which option best describes a MAC address spoofing attack?
An attacker gains access to another host and masquerades as therightful user of that device.
An attacker alters the MAC address of his host to matchanother known MAC address of a target host.
An attacker alters the MAC address of the switch to gain accessto the network device from a rogue host device.
An attacker floods the MAC address table of a switch so that theswitch can no longer filter network access based on MAC
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
Chapter 6Chapter 7Chapter 8Chapter 9Chapter 10Final Exam
RANDOM TERMS
matlab code forfiltering maskpt activity 8 6 1 ccnaskills integrationchallenge instructorccna securitychapter 3 v1 1mysql port ändernxamppt is an accuratedescription of CHAPwhen used with PPPon a serial
addresses.
Which attack relies on the default automatic trunkingconfiguration on most Cisco switches?
LAN storm attack
VLAN hopping attack
STP manipulation attack
MAC address spoofing attack
Which two measures are recommended to mitigate VLAN hoppingattacks? (Choose two.)
Use a dedicated native VLAN for all trunk ports.
Place all unused ports in a separate guest VLAN.
Disable trunk negotiation on all ports connecting toworkstations.
Enable DTP on all trunk ports.
Ensure that the native VLAN is used for management traffic.
Which three are SAN transport technologies? (Choose three.)
Fibre Channel
SATA
iSCSI
IP PBX
FCIP
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
connection betweentwo routers?
IDE
Refer to the exhibit. What action will the switch take when themaximum number of secure MAC addresses has reached theallowed limit on the Fa0/2 port?
Packets with unknown source addresses are dropped, butnotification of the dropped packets is sent.
The VLAN that Fa0/2 is on is set to error-disabled and all trafficon the VLAN is stopped.
The interface immediately becomes error-disabled and the portLED is turned off.
Packets with unknown source addresses are dropped withoutnotification.
Which software tool can a hacker use to flood the MAC addresstable of a switch?
macof
Cisco CCP
kiwi syslog server
protocol analyzer
Which two methods are used to mitigate VLAN attacks? (Choosetwo.)
enabling port security on all trunk ports
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
using a dummy VLAN for the native VLAN
implementing BPDU guard on all access ports
disabling DTP autonegotiation on all trunk ports
using ISL instead of 802.1q encapsulation on all trunk interfaces
Which three switch security commands are required to enable portsecurity on a port so that it will dynamically learn a single MACaddress and disable the port if a host with any other MAC addressis connected? (Choose three.)
switchport mode access
switchport mode trunk
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security mac-address mac-address
What is an example of a trusted path in an operating system?
digital certificate
digital signature
hash message authentication
Ctrl-Alt-Delete key sequence
Why are traditional network security perimeters not suitable forthe latest consumer-based network endpoint devices?
These devices are not managed by the corporate IT department.
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
These devices are more varied in type and are portable.
These devices connect to the corporate network through publicwireless networks.
These devices pose no risk to security as they are not directlyconnected to the corporate network.
Which Cisco IronPort appliance would an organization install tomanage and monitor security policy settings and audit information?
C-Series
M-Series
S-Series
SenderBase-Series
Which Cisco IronPort appliance would an organization install toprotect against malware?
C-Series
M-Series
S-Series
SenderBase-Series
What is the goal of the Cisco NAC framework and the Cisco NACappliance?
to ensure that only hosts that are authenticated and have hadtheir security posture examined and approved are permittedonto the network
to monitor data from the company to the ISP in order to build a
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
real-time database of current spam threats from both internaland external sources
to provide anti-malware scanning at the network perimeter forboth authenticated and non-authenticated devices
to provide protection against a wide variety of web-based threats,including adware, phishing attacks, Trojan horses, and worms
When the Cisco NAC appliance evaluates an incoming connectionfrom a remote device against the defined network policies, whatfeature is being used?
authentication and authorization
posture assessment
quarantining of noncompliant systems
remediation of noncompliant systems
Which command is used to configure the PVLAN Edge feature?
switchport block
switchport nonnegotiate
switchport protected
switchport port-security violation protect
Which statement is true about a characteristic of the PVLANEdge feature on a Cisco switch?
All data traffic that passes between protected ports must beforwarded through a Layer 2 device.
All data traffic that passes between protected ports must beforwarded through a Layer 3 device.
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
Only broadcast traffic is forwarded between protected ports.
Only unicast traffic is forwarded between protected ports.
What is the default configuration of the PVLAN Edge feature on aCisco switch?
All active ports are defined as protected.
All ports are defined as protected.
No ports are defined as protected.
EtherChannel groups are defined as protected ports.
Under which circumstance is it safe to connect to an open wirelessnetwork?
The connection utilizes the 802.11n standard.
The device has been updated with the latest virus protectionsoftware.
The connection is followed by a VPN connection to a trustednetwork.
The user does not plan on accessing the corporate network whenattached to the open wireless network.
As stated earlier, all this answers has been verified to be 100%correct. If you found any wrong answers provided, please leavecomment below. We do appreciate all the corrections that youmade. If you want to contribute for new question or any latestversion of chapter test and exam question, please let me know. Wedo appreciate it too.
Credit: The answer in this chapter test has been provided by Xase.All credit goes to him.
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
ONE THOUGHT ON “ANSWER CCNA SECURITY CHAPTER 6 TEST – CCNAS V1.1”
This entry was posted in Data Network, Network Security and tagged 2012,Answer, CCNA Security, CCNA Security Chapter 6 Answer, CCNASecurity Chapter 6 Test, CCNAS Chapter 6 Test, CCNAS v1.1, Chapter6 Test, Solution, Solution CCNA Security Chapter 6 by InviAlgo. Bookmarkthe permalink.
Vpn Connection Hosts Water Filter
emanuel on August 4, 2012 at 11:19 PM
said:
Millones de gracias!. Me has salvado deun gran aprieto. La mejor pagina deTODAS!.
Reply ↓
Leave a ReplyYour email address will not be published. Requiredfields are marked *
Name *
Email *
Website
Comment
Answer CCNA Security Chapter 6 Test – CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]
Search Invisible Algorithm:ccna security chapter 6 exam answers, ccna security chapter 6answers, as a recommended practice for layer 2 security how shouldvlan 1 be treated?, pt activity layer 2 security answer, why aretraditional network security perimeters not suitable for the latestconsumer-based network endpoint devices?, Which command is usedto configure the PVLAN Edge feature?, ccnas chapter 6, Under whichcircumstance is it safe to connect to an open wireless network?,Which Cisco IronPort appliance would an organization install to protectagainst malware?, what is an example of a trusted path in anoperating system?
All
Notify me of followup
comments via e-mail. You
can also subscribe without commenting.