Welcome to your CCNA 3 v7 Modules 3 – 5: Network Security
1.
A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)
2.
Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?
3.
What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?
4.
What type of ACL offers greater flexibility and control over network access?
5.
Refer to the exhibit. A new network policy requires an ACL denying FTP and Telnet access to a Corp file server from all interns. The address of the file server is 172.16.1.15 and all interns are assigned addresses in the 172.18.200.0/24 network. After implementing the ACL, no one in the Corp network can access any of the servers. What is the problem?
6.
Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?
7.
A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
8.
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?
9.
What is the term used to describe gray hat hackers who publicly protest organizations or governments by posting articles, videos, leaking sensitive information, and performing network attacks?
10.
Which objective of secure communications is achieved by encrypting data?
11.
Refer to the exhibit. The company CEO demands that one ACL be created to permit email traffic to the internet and deny FTP access. What is the best ACL type and placement to use in this situation?
12.
Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What interface and in what direction should you place a standard ACL that allows printing to P1 from data VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer? (Choose two.)
13.
What is the quickest way to remove a single ACE from a named ACL?
14.
Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface Fa0/0. Which conclusion can be drawn from this configuration?
15.
Refer to the exhibit. Only authorized remote users are allowed remote access to the company server 192.168.30.10. What is the best ACL type and placement to use in this situation?
16.
Which statement describes a difference between the operation of inbound and outbound ACLs?
17.
What is the term used to describe a guarantee that the message is not a forgery and does actually come from whom it states?
18.
A technician is tasked with using ACLs to secure a router. When would the technician use the ‘ip access-group 101 in’ configuration option or command?
19.
A technician is tasked with using ACLs to secure a router. When would the technician use the 40 deny host 192.168.23.8 configuration option or command?
20.
In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services?
21.
A technician is tasked with using ACLs to secure a router. When would the technician use the any configuration option or command?
22.
Which type of hacker is motivated to protest against political and social issues?
23.
A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.)
24.
Refer to the exhibit. An administrator first configured an extended ACL as shown by the output of the show access-lists command. The administrator then edited this access-list by issuing the commands below. Which two conclusions can be drawn from this new configuration? (Choose two.)
Router(config)# ip access-list extended 101
Router(config-ext-nacl)# no 20
Router(config-ext-nacl)# 5 permit tcp any any eq 22
Router(config-ext-nacl)# 20 deny udp any any
25.
What wild card mask will match networks 172.16.0.0 through 172.19.0.0?
26.
Refer to the exhibit. An administrator has configured a standard ACL on R1 and applied it to interface serial 0/0/0 in the outbound direction. What happens to traffic leaving interface serial 0/0/0 that does not match the configured ACL statements?
27.
In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?
28.
If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?
29.
A technician is tasked with using ACLs to secure a router. When would the technician use the deny configuration option or command?
30.
Refer to the exhibit. Network 192.168.30.0/24 contains all of the company servers. Policy dictates that traffic from the servers to both networks 192.168.10.0 and 192.168.11.0 be limited to replies for original requests. What is the best ACL type and placement to use in this situation?
31.
A technician is tasked with using ACLs to secure a router. When would the technician use the host configuration option or command?
32.
Refer to the exhibit. A network administrator wants to permit only host 192.168.1.1 /24 to be able to access the server 192.168.2.1 /24. Which three commands will achieve this using best ACL placement practices? (Choose three.)
33.
Refer to the exhibit. A network administrator configures an ACL on the router. Which statement describes the result of the configuration?
34.
Which ACE will permit a packet that originates from any network and is destined for a web server at 192.168.1.1?
35.
A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?
36.
What is the term used to describe a mechanism that takes advantage of a vulnerability?
37.
What does the CLI prompt change to after entering the command ip access-list standard aaa from global configuration mode?
38.
Refer to the exhibit. The student on the H1 computer continues to launch an extended ping with expanded packets at the student on the H2 computer. The school network administrator wants to stop this behavior, but still allow both students access to web-based computer assignments. What would be the best plan for the network administrator?
39.
A technician is tasked with using ACLs to secure a router. When would the technician use the established configuration option or command?
40.
In which type of attack is falsified information used to redirect users to malicious Internet sites?
41.
Refer to the exhibit. Internet privileges for an employee have been revoked because of abuse but the employee still needs access to company resources. What is the best ACL type and placement to use in this situation?
42.
What type of malware has the primary objective of spreading across the network?
43.
A technician is tasked with using ACLs to secure a router. When would the technician use the remark configuration option or command?
44.
What is the term used to describe the same pre-shared key or secret key, known by both the sender and receiver to encrypt and decrypt data?
45.
Which statement accurately characterizes the evolution of threats to network security?
46.
Refer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?
47.
Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?
48.
What is considered a best practice when configuring ACLs on vty lines?
50.
In what way are zombies used in security attacks?
51.
Refer to the exhibit. What can be determined from this output?
52.
Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?
A. access-list 103 deny tcp host 192.168.10.0 any eq 23
access-list 103 permit tcp host 192.168.10.1 eq 80
B. access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
C. access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet
D. access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
53.
Which statement describes a characteristic of standard IPv4 ACLs?
54.
What is the term used to describe unethical criminals who compromise computer and network security for personal gain, or for malicious reasons?
55.
Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)
56.
What causes a buffer overflow?
57.
Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)
58.
The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
59.
What is the term used to describe a potential danger to a company’s assets, data, or network functionality?
60.
Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure?
61.
What is the best description of Trojan horse malware?
62.
What commonly motivates cybercriminals to attack networks as compared to hacktivists or state-sponsored hackers?
63.
What is a feature of an IPS?
64.
Refer to the exhibit. The network administrator has an IP address of 192.168.11.10 and needs access to manage R1. What is the best ACL type and placement to use in this situation?
65.
Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?
66.
Refer to the exhibit. Employees on 192.168.11.0/24 work on critically sensitive information and are not allowed access off their network. What is the best ACL type and placement to use in this situation?
67.
A technician is tasked with using ACLs to secure a router. When would the technician use the ip access-group 101 in configuration option or command?
68.
Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)
Consider the following access list:
access-list 100 permit ip host 192.168.10.1 any
access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo
access-list 100 permit ip any any
69.
What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255 any eq www command have when implemented inbound on the f0/0 interface?
70.
Refer to the exhibit. Many employees are wasting company time accessing social media on their work computers. The company wants to stop this access.
71.
Refer to the exhibit. Which two ACLs would permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface? (Choose two.)
A. access-list 1 permit 192.168.10.0 0.0.0.127
B. access-list 2 permit host 192.168.10.9
access-list 2 permit host 192.168.10.69
C. access-list 5 permit 192.168.10.0 0.0.0.63
access-list 5 permit 192.168.10.64 0.0.0.63
D. access-list 3 permit 192.168.10.128 0.0.0.63
E. access-list 4 permit 192.168.10.0 0.0.0.255
72.
Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement?
73.
Refer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best ACL type and placement to use in this situation?
74.
A technician is tasked with using ACLs to secure a router. When would the technician use the no ip access-list 101 configuration option or command?