19.07.2013 Views

Cisco CCNA Security Practice Exam Questions - The Cisco ...

Cisco CCNA Security Practice Exam Questions - The Cisco ...

Cisco CCNA Security Practice Exam Questions - The Cisco ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

15. W h ich statem ent is true w h en config uring access control lists ( A CL s) on a <strong>Cisco</strong> router?<br />

A ) A CL s filter all traffic th roug h and sourced from th e router.<br />

B ) A pply th e A CL to th e interface prior to config uring access control entries to ensure th at controls are<br />

applied im m ed iately upon config uration.<br />

C) A n “ im plicit d eny ” is applied to th e start of th e A CL entry by d efault.<br />

D ) O nly one A CL per protocol, per d irection, and per interface is allow ed .<br />

16. W h ich option correctly d efines asy m m etric encry ption?<br />

A ) uses th e sam e k ey s to encry pt and d ecry pt d ata<br />

B ) uses M D 5 h ash ing alg orith m s for d ig ital sig nag e encry ption<br />

C) uses d ifferent k ey s to encry pt and d ecry pt d ata<br />

D ) uses S H A -1 h ash ing alg orith m s for d ig ital sig nag e encry ption<br />

17. W h ich option is a d esirable feature of using sy m m etric encry ption alg orith m s?<br />

A ) Th ey are often used for w ire-speed encry ption in d ata netw ork s.<br />

B ) Th ey are based on com plex m ath em atical operations and can easily be accelerated by h ard w are.<br />

C) Th ey offer sim ple k ey m anag em ent properties.<br />

D ) Th ey are best used for one-tim e encry ption need s.<br />

18. W h ich option is true of using cry ptog raph ic h ash es?<br />

A ) Th ey are easily rev ersed to d eciph er th e m essag e contex t.<br />

B ) Th ey conv ert arbitrary d ata into a fix ed -leng th d ig est.<br />

C) Th ey are based on a tw o-w ay m ath em atical function.<br />

D ) Th ey are used for encry pting bulk d ata com m unications.<br />

19. W h ich option is true of intrusion prev ention sy stem s?<br />

A ) Th ey operate in prom iscuous m od e.<br />

B ) Th ey operate in inline m od e.<br />

C) Th ey h av e no potential im pact on th e d ata seg m ent being m onitored .<br />

D ) Th ey are m ore v ulnerable to ev asion tech niq ues th an I D S .<br />

20 . W h ich statem ent is true w h en using zone-based firew alls on a <strong>Cisco</strong> router?<br />

A ) Policies are applied to traffic m ov ing betw een zones, not betw een interfaces.<br />

B ) Th e firew alls can be config ured sim ultaneously on th e sam e interface as classic CB A C using th e i p<br />

i n s p e c t CL I com m and .<br />

C) I nterface A CL s are applied before zone-based policy firew alls w h en th ey are applied outbound .<br />

D ) W h en config ured w ith th e “ PA S S ” action, stateful inspection is applied to all traffic passing betw een<br />

th e config ured zones.<br />

4 C i s c o C C N A S e c u r i t y P r a c t i c e E x a m Q u e s t i o n s © 20 0 9 C i s c o S y s t e m s , I n c .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!