Welcome to your CCNA-Security Fundamentals 1. 1. Which term describes the outside of the corporate firewall? A. DMZ B. Perimeter C. Internal D. Trusted None 2. 2. Which term describes the area accessible to the Internet yet protected by the corporate firewall? A. DMZ B. Perimeter C. Internal D. Trusted None 3. 3. Which type of device can prevent an intrusion on your network? A. Honey pots B. IDS C. IPS D. HIDS None 4. 4. When dealing with firewalls, the term trusted network is used to describe what? A. Internal network B. The Internet C. The DMZ D. A network with SSL None 5. 5. Which is a common attack method used to overwhelm services with traffic from multiple Internet sources? A. Denial of service B. Distributed denial of service C. IP address spoofing D. Session hijacking None 6. 6. Which type of device can detect an intrusion on your network? A. Honey pots B. IDS C. IPS D. HIDS None 7. 7. Which method can be used to stop ping sweep A. Deploying host intrusion detection systems B. Deploying network intrusion detection systems C. Blocking RFC 1918 addresses at the perimeter D. Blocking ICMP echo requests and echo replies at the perimeter None 8. 8. Which appliance can be used to mitigate denial of service attacks? A. Honey pots B. IDS C. IPS D. HIDS None 9. 9. Which is a common attack method used to attempt to gain access to a system using a false identity? A. Denial of service B. Distributed denial of service C. IP address spoofing D. Session hijacking None 10. 10. Which method would prevent tampering of data in transit? A. Access control lists (ACLs) B. Spoofing mitigation C. SSL D. Encryption of the data None 11. 11. A rouge wireless access point (WAP) is created with the same SSID as the corporate SSID. The attacker has employees connect to the SSID and watches the information as it’s relayed to the original SSID. What type of attack is described here? A. Smurf attack B. Compromised key attack C. Sniffer attack D. Man in the middle attack None 12. 12. What can you use to protect against spoofing of internal IP addresses on the perimeter of your network? A. ACLs B. Intrusion detection systems C. SSL D. Host intrusion detection systems None 13. 13. Which is a requirement for the use of DHCP snooping to protect a device? A. The device is on a layer 2 switched port on the same VLAN. B. The DHCP server is running on the layer 2 switch. C. The device is on a layer 3 routed port on the same VLAN. D. Configuration of a dedicated IP address for monitoring DHCP transactions. None 14. 14. What attack vector can be used for a man in the middle attack? A. DHCP B. DNS C. Wireless D. All of the above None 15. 15. Which attack can be used on a native VLAN? A. Double tagging B. VLAN traversal C. Trunk popping D. Denial of service None 16. 16. Which command is used to configure the port of a switch as trusted for DHCP snooping? A. Switch(config-if)#ip dhcp snooping trust B. Switch(config-if)#dhcp snooping trust C. Switch(config)#ip dhcp snooping trust interface gi 2/3 D. Switch(config-if)#ip dhcp trust None 17. 17. Why should you always change the native VLAN? A. The native VLAN contains frames from all VLANs. B. The native VLAN is configured on all switches for logging. C. The native VLAN is the default on all switch ports. D. The native VLAN provides no encryption. None 18. 18. What can protect users from a phishing attack that is sent via email? A. Training B. Anti-malware software C. Antivirus software D. Certificates None 19. 19. Your company provides medical data to doctors from a worldwide database. Because of the sensitive nature of the data, it’s imperative that authentication be established on each session and be valid only for that session. Which of the following authentication methods provides credentials that are valid only during a specific period of time? A. Token B. Certificate C. Smart card D. License None 20. 20. A user has brought an email to your attention that is not from his bank, but it looks like his bank’s website when he clicks on the link. What is this most likely? A. Spam B. Password cracking C. Phishing D. Worm None 21. 21. What type of filters can be placed over a monitor to prevent the data on the screen from being readable when viewed from the side? A. Security B. Privacy C. Degaussing D. Tempered None 22. 22. Which form of social engineering is nothing more than looking over someone’s shoulder while they enter or view sensitive information? A. Shoulder surfing B. Phishing C. Tailgating D. Whaling None 23. 23. Several office-level users have administrative privileges on the network. Which of the following is the easiest to implement to immediately add security to the network? A. Biometric authentication B. Hardware tokens C. Active Directory D. Least privilege None 24. 24. You need to protect your users from Trojans, viruses, and phishing emails. What should you implement? A. Multifactor authentication B. Software firewalls C. Anti-malware software D. Antivirus software None 25. 25. What is a method for stopping tailgating? A. User authentication B. Mantraps C. Strong passwords D. Change SSIDs None 26. 26. Which command will configure the enable password for a router or switch? A. Router(config)#password enable Password20! B. Router(config)#enable Password20! C. Router(config)#enable secret Password20! D. Router(config)#secret enable Password20! None 27. 27. You need to set the login password for Telnet. Which command will you type first? A. Switch(config)#interface vlan 1 B. Switch(config)#line console 1 C. Switch(config)#line aux 1 D. Switch(config)#line vty 0 5 None 28. 28. You have set the enable password using enable password Password20!. However, when you try to get to a privileged exec prompt, the router states that you are using an incorrect password. What is the problem? A. You originally entered the wrong password. B. The enable secret password is set to something else. C. The password Password20! contains a special character. D. The password is too long and has been truncated. None 29. 29. Which command(s) will set a password and require login for a line? A. Router(config-line)#set password Password20!Router(config-line)#request loginB. Router(config-line)#password Password20!Router(config-line)#login passwordC. Router(config-line)#password Password20!Router(config-line)#loginD. Router(config-line)#login password Password20! A. Option A B. Option B C. Option C C. Option D None 30. 30. You Telnet to a switch and receive the error Password required, but none set.[Connection to 192.168.1.1 closed by foreign host]. What is the problem? A. The enable secret is not set. B. The enable password is not set. C. The line login password is not set. D. The line is administratively down. None 31. 31. What is required before generating the encryption keys for SSH on a router or switch? A. Setting the time and date B. Setting the hostname and domain name C. Setting the key strength D. Setting the key repository None 32. 32. Which command will enable SSH version 2 for logins? A. Router(config)#ip ssh version 2 B. Router(config-line)#version 2 C. Router(config-ssh)#version 2 D. Router(config)#ssh version 2 None 33. 33. Which command will configure the router or switch to allow SSH as a protocol for management with a fallback of Telnet? A. Switch(config)#login ssh telnet B. Switch(config-line)#login ssh telnet C. Switch(config-line)#transport ssh telnet D. Switch(config)#transport ssh telnet None 34. 34. Why should Telnet be replaced with SSH? A. Telnet has weak encryption. B. SSH allows for file copy. C. SSH makes it easier to create ACLs for access. D. SSH is encrypted. None 35. 35. Which command will create and apply an access list to secure router or switch management? A. Switch(config)#access-list 1 permit host 192.168.1.5Switch(config)#interface vlan 1Switch(config-if)#ip access-group 1 inB. Switch(config)#access-list 1 permit host 192.168.1.5Switch(config)#line vty 0 5Switch(config-line)#ip access-group 1 inC. Switch(config)#access-list 1 permit host 192.168.1.5Switch(config)#line vty 0 5Switch(config-line)#ip access-class 1 inD. Switch(config)#access-list 1 permit host 192.168.1.5Switch(config)#ip access-group 1 in A. Option A B. Option B C. Option C D. Option D None 36. 36. You have created the SSH encryption keys, but you cannot enable SSH version 2. What is the problem? A. The time and date need to be corrected. B. The key strength needs to be 768 bits or higher. C. The DNS server is not configured. D. There is no host record for the switch or router. None 37. 37. Which command will configure a local user for SSH access? A. Router(config)#username user1 password Password20! B. Router(config)#account user1 C. Router(config)#user user1 Password20! D. Router(config)#user-account user1 password Password20! None 38. 38. You configured the password for Telnet access, but when you perform a show running-configuration, the password shows in clear text. Which command should be run? A. Router(config)#password encryption B. Router(config)#service password-encryption C. Router(config)#service encryption D. Router(config)#password-encryption service None 39. 39. Which command will generate the encryption keys for SSH? A. Router(config)#generate crypto key rsa B. Router(config)#crypto key generate rsa C. Router(config)#crypto generate key rsa D. Router#crypto key generate rsa None 40. 40. Which command will disable auto-disconnect for idle privileged exec sessions? A. Switch(config-line)#exec-timeout 0 0 B. Switch(config)#exec-timeout 0 C. Switch(config-line)#timeout 0 0 D. Switch(config-line)#no exec-timeout None 41. 41. In the following exhibit, you have listed all management sessions on the switch. On which line are you connected? A. Console 0 B. VTY 0 C. VTY 1 D. VTY 2 None 42. 42. You want to turn on local authentication so that a user must supply a username and password when managing the switch. You have created the username and password combinations on the switch. Which command will direct SSH and Telnet to use this authentication model? A. Switch(config)#new aaa model B. Switch(config)#local authentication C. Switch(config-line)#local authentication D. Switch(config-line)#login local None 43. 43. During a recent external security audit, it was determined that your enable password should be secured with SHA-256 scrypt. Which command will change the password strength on the switches and routers? A. Switch(config)#enable secret 9 B. Switch(config)#service password-encryption scrypt C. Switch(config)#enable secret algorithm-type scrypt D. Switch(config)#enable algorithm-type scrypt secret Password20! None 44. 44. What is the default encryption method for passwords when you configure a line password? A. MD5 B. SHA-128 C. SHA-256 D. Clear text None 45. 45. You need to change the default idle time before disconnection of privileged exec mode for network administrators. Which command will change it to 30 minutes? A. Switch(config)#exec-timeout 30 0 B. Switch(config-line)#exec-timeout 30 0 C. Switch(config-line)#exec-timeout 0 30 D. Switch(config-line)#timeout 30 0 None 46. 46. You need to disconnect a network admin from the switch or router. Which command would you use? A. Switch(config)#no enable secret B. Switch#no line vty 2 C. Switch#disconnect line vty 2 D. Switch#clear line vty 2 None 47. 47. Which banner can deliver a message only to authenticated users regardless of connection type? A. MOTD banner B. Login banner C. Exec banner D. Incoming banner None 48. 48. Which technology will give selective access to the network based upon authentication? A. 802.1Q B. ACLs C. 802.1X D. Firewall None 49. 49. What is the end device that sends credentials for 802.1X called? A. Authenticator B. Supplicant C. AAA server D. RADIUS server None 50. 50. What is the switch called in an 802.1X configuration? A. Authenticator B. Supplicant C. AAA server D. RADIUS server None 51. 51. What protocol does the supplicant communicate to the authenticator for 802.1X? A. 802.1X EAP B. UDP C. TCP D. IP None 52. 52. Which protocol is used by 802.1X for supplicant to authenticator and authenticator to authentication server? A. 802.1X authentication headers B. IPsec C. EAP D. RADIUS None 53. 53. Which device is the supplicant during the 802.1X authentication process? A. The device requesting access B. The server that is providing authentication C. The device that is controlling access via 802.1X D. The device connecting the layer 3 network None 54. 54. A smart card is an example of which type of authentication? A. Single-factor authentication B. RADIUS authentication C. Multifactor authentication D. Active Directory authentication None 55. 55. You believe that a user’s account has been compromised via a password attack. What should have been enforced to prevent this? (Choose the best answer.) A. Password complexity B. Password expiration C. Phishing protection D. Time restrictions None 56. 56. Which statement is correct about Generic Routing Encapsulation (GRE) tunnels? A. GRE uses IPsec security. B. GRE uses a protocol of 57. C. GRE provides per-packet authentication. D. GRE provides packet-in-packet encapsulation. None 57. 57. Which tunnel protocol is a Cisco proprietary protocol? A. GRE B. PPP C. IPsec D. SSL None 58. 58. Which layer 3 protocol does GRE use? A. Protocol 4 B. Protocol 43 C. Protocol 47 D. Protocol 57 None 59. 59. In the following exhibit, you are configuring a GRE tunnel. What is wrong with this configuration? A. Nothing is wrong with the configuration. B. The destination on Router A of the tunnel is incorrect. C. The network is unrouteable. D. The serial interfaces are on different networks. None 60. 60. In the following exhibit, you are configuring a GRE tunnel and need to configure a route statement on Router A. Which is the correct route statement? A. Router(config)#ip route 192.168.3.0 255.255.255.0 tunnel 0 B. Router(config)#ip route 192.168.2.0 255.255.255.0 tunnel 0 C. Router(config)#ip route 192.168.3.0 255.255.255.0 serial 0/0/1 D. Router(config)#ip route 192.168.3.0 255.255.255.0 192.168.2.2 None 61. 61. What is the default MTU of a GRE tunnel? A. MTU 1476 B. MTU 1492 C. MTU 1500 D. MTU 1528 None 62. 62. Which command will help you verify the source and destination of a GRE tunnel? A. Router#show ip tunnel 0 B. Router#show interface tunnel 0 C. Router#show ip gre D. Router#show ip route None 63. 63. In the following exhibit, if you do a traceroute on Router A to a destination of 192.168.3.50, how many hops will show? A. One hop B. Two hops C. Four hops D. Zero hops None 64. 64. Refer to the following exhibit. You are configuring a GRE tunnel. However, you cannot ping from Router A to 192.168.3.1. What is the problem? A. The tunnel numbers do not match. B. The destination on Router A of the tunnel is incorrect. C. The routes are wrong. D. The serial interfaces do not match. None 65. 65. Which protocol helps resolve and direct traffic for DMVPN connections? A. HSRP B. NHRP C. ARP D. GRE None 66. 66. Refer to the following exhibit. You have configured a point-to-point dedicated line between two locations. However, you cannot ping between the two routers. What is the problem? A. The interface is administratively shut down. B. There is a wiring problem. C. There is a protocol mismatch. D. There is an IP address mismatch. None 67. 67. DMVPN is an example of which topology? A. Point-to-point B. Hub-and-spoke C. Full-mesh D. Dual-homed None 68. 68. Which benefit of using a secure VPN allows verification that a packet was not tampered with in transit? A. Authentication B. Data integrity C. Anti-replay D. Confidentiality None 69. 69. Which Cisco technology is often used to create VPN tunnels between sites? A. Catalyst switches B. Cisco routers C. Cisco FTD D. Policy-based routing None 70. 70. You have several remote workers who enter patient information and require a high level of security. Which technology would best suit the connectivity for these workers? A. GRE tunnels B. Wireless WAN C. Client SSL/VPN D. Site-to-site VPN None 71. 71. Which protocol does IPsec use to encrypt data packets? A. AH B. ESP C. IKE D. ISAKMP None 72. 72. What is a benefit of site-to-site IPsec VPNs? A. Lower bandwidth requirements B. Lower latency C. Scalability D. Support for multicast None 73. 73. What is the range of a standard access list? A. 1 to 99 B. 1 to 100 C. 100 to 199 D. 100 to 200 None 74. 74. Which statement is correct about a standard ACL? A. Conditions can be based upon only the destination address. B. Conditions can be based upon only the source address and source port. C. Conditions can be based upon only the source address. D. Conditions can be based upon the source or destination address and source or destination port. None 75. 75. What is the range of an extended access list? A. 1 to 99 B. 1 to 100 C. 100 to 199 D. 100 to 200 None 76. 76. What is at the end of every ACL? A. permit any any B. deny any any C. log all D. End of ACL marker None 77. 77. Which statement is correct about an ACL? A. Packets are compared sequentially against each line in an access list, and the last matching condition is the action taken. B. Packets are compared sequentially against each line in an access list until a match is made. C. Packets are compared, and if no matching rule exists, they are allowed. D. At the end of the ACL, there is an implicit allow. None 78. 78. What is an advantage of using a standard ACL? A. More secure B. Less processing overhead C. More specific rules D. Blocking of applications None 79. 79. What is the expanded range of a standard access list? A. 1000 to 1999 B. 1100 to 1299 C. 1300 to 1999 D. 2000 to 2699 None 80. 80. You need to filter traffic for the 172.16.0.0/12 network. Which wildcard mask would you use? A. 255.240.0.0 B. 0.0.240.255 C. 0.15.255.255 D. 255.3.0.0 None 81. 81. Which command would configure an ACL to block traffic coming from 192.168.1.0/24? A. Router(config)#ip access-list 20 192.168.1.0 0.0.0.255 B. Router(config)#ip access-list 100 192.168.1.0 0.0.0.255 C. Router(config)#ip access-list 1 192.168.1.0/24 D. Router(config)#ip access-list 2 192.168.1.0 255.255.255.0 None 82. 82. If you configure a rule with the address of 0.0.0.0 and wildcard mask of 255.255.255.255, what are you doing? A. Defining the broadcast address B. Defining no addresses C. Defining the network address D. Defining all addresses None 83. 83. Which statement is correct about applying ACLs to an interface? A. An ACL can be applied in only one direction. B. An ACL can be applied only to a single protocol. C. An ACL can be applied only to a single port. D. All of the above. None 84. 84. You need to filter an application. Which type of access list will you use to complete the task? A. Standard B. Extended C. Dynamic D. Expanded None 85. 85. What is the expanded range of an extended access list? A. 1000 to 1999 B. 1100 to 1299 C. 1300 to 1999 D. 2000 to 2699 None 86. 86. You need to filter traffic for the 192.168.1.0/25 network. Which wildcard mask would you use? A. 255.255.255.128 B. 0.0.0.128 C. 0.0.0.127 D. 0.0.0.63 None 87. 87. Which type of ACL allows for removing a single entry without removing the entire ACL? A. Standard B. Dynamic C. Extended D. Named None 88. 88. Which type of ACL allows you to open a port only after someone has successfully logged into the router? A. Standard B. Dynamic C. Extended D. Named None 89. 89. Which statement configures a standard access list? A. Router(config)#access-list 20 deny 172.16.0.0 0.255.255.255 B. Router(config)#access-list 180 permit udp any 172.16.0.0 0.255.255.255 eq 161 C. Router(config)#access-list 130 permit permit ip any any D. Router(config)#access-list 150 deny any 172.16.0.0 0.255.255.255 None 90. 90. Which statement can be used in lieu of access-list 5 permit 192.168.1.5 0.0.0.0? A. Router(config)#access-list 5 permit 192.168.1.5 B. Router(config)#access-list 5 permit 192.168.1.5/24 C. Router(config)#access-list 5 permit host 192.168.1.5 D. Router(config)#access-list 5 permit 192.168.1.0 0.0.0.255 None 91. 91. Referring to the following exhibit, you need to block traffic from the host 192.168.2.6 to the HR web application server but allow it to get to all other servers and the Internet. Which command(s) will achieve this? A. Router(config)#access-list 101 deny tcp host192.168.2.6 host 192.168.1.3 eq 80Router(config)#access-list 101 permit any anyB. Router(config)#access-list 101 deny tcp host192.168.2.6 host 192.168.1.3 eq 80Router(config)#access-list 101 permit ip any anyC. Router(config)#access-list 101 deny host 192.168.2.6host 192.168.1.3 eq 80Router(config)#access-list 101 permit any anyD. Router(config)#access-list 101 deny tcp host192.168.2.6 host 192.168.1.3 eq 80Router(config)#access-list 101 permit ip any any eq 80 A. Option A B. Option B C. Option C D. Option D None 92. 92. Which type of access list limits you to describing traffic by source address? A. Extended B. Named C. Dynamic D. Standard None 93. 93. Which statement will block traffic for a server of 192.168.1.5 for SSH? A. Router(config)#access-list 90 deny ip host 192.168.1.5 eq 22 B. Router(config)#access-list 90 deny tcp any host 192.168.1.5 eq 22 C. Router(config)#access-list 199 deny tcp host 192.168.1.5 any eq 23 D. Router(config)#access-list 199 deny tcp any host 192.168.1.5 eq 22 None 94. 94. Referring to the following exhibit, you need to block traffic from the host network to the HR web application and allow all traffic to get to the intranet web server. Which type of ACL would you use? A. Standard B. Dynamic C. Extended D. Expanded None 95. 95. Which statement configures a valid access list? A. Router(config)#access-list 99 deny tcp host 192.168.2.7 eq 443 B. Router(config)#access-list 189 deny any host 192.168.1.5 eq 22 C. Router(config)#access-list 143 permit tcp host 192.168.8.3 eq 80 any D. Router(config)#access-list 153 permit any host 192.168.4.5 eq 22 None 96. 96. You want to apply an access list of 198 to an interface to filter traffic into the interface. Which command will achieve this? A. Router(config)#ip access-list 198 in fast 0/1 B. Router(config-if)#ip access-list 198 in C. Router(config-if)#ip access-class 198 in D. Router(config-if)#ip access-group 198 in None 97. 97. Referring to the following exhibit, you want to block the host network from accessing the HR network. Which commands will place the access list on the proper interface to make it effective? A. Router(config)#interface gi 0/0Router(config-if)#ip access-group 2 inB. Router(config)#interface gi 0/0Router(config-if)#ip access-group 2 outC. Router(config)#interface gi 0/2Router(config-if)#ip access-group 2 inD. Router(config)#interface gi 0/2Router(config-if)#ip access-group 2 out A. Option A B. Option B C. Option C D. Option D None 98. 98. Which command will allow you to see the output in the following exhibit with the line numbers? A. Switch#show access-list named_list B. Switch#show ip access-list named_list C. Switch#show running-configuration D. Switch#show ip access-list None 99. 99. Which type of ACL should be placed closest to the source of traffic? A. Extended B. Standard C. Dynamic D. Expanded None 100. 100. Which command will create an extended named access list? A. Router(config)#access-list 101 allow host 192.168.1.5 any B. Router(config)#ip access-list named_list C. Router(config)#ip access-list extended named_list D. Router(config)#ip access-list 101 named_list None 101. 101. Which type of ACL should be placed closest to the destination of traffic? A. Extended B. Standard C. Dynamic D. Expanded None 102. 102. Which command should you start with when trying to diagnose port security issues? A. Switch#show port-security B. Switch#show mac address-table C. Switch#show interface D. Switch#show security None 103. 103. You have configured an access port for a remote office computer. The office has no IT persons on site. You want to stop workers from plugging in a WAP and exposing your company’s internal network. Which feature should you configure? A. Dynamic VLANs B. Port security C. ACLs D. VLAN pruning None 104. 104. Which method can restrict a user from plugging a wireless access point into a corporate network? A. Access control lists B. Port security C. Wired Equivalent Privacy D. Static MAC addresses None 105. 105. What does port security use to block unauthorized access? A. Source MAC addresses B. Destination MAC addresses C. Source IP addresses D. Destination IP addresses None 106. 106. Which command will enable port security? A. Switch(config)#switchport port-security B. Switch(config)#port-security enable C. Switch(config-if)#switchport port-security D. Switch(config-if)#port-security enable None 107. 107. If port security is enabled on an interface, what is the maximum number of MAC addresses allowed by default? A. 1 MAC address B. 2 MAC addresses C. 0 MAC addresses D. 10 MAC addresses None 108. 108. Which layer of the OSI model does port security use for securing a port? A. Layer 0 B. Layer 1 C. Layer 2 D. Layer 3 None 109. 109. Why would a network admin choose to configure port security on an interface? A. To allow or disallow VLANs B. To allow or disallow IP addresses C. To prevent unauthorized access by MAC address D. To prevent unauthorized access by users None 110. 110. Which statement is correct about port security? A. Port security works best in mobile environments. B. Port security requires a higher amount of memory. C. Port security works best in static environments. D. Port security always results in admin intervention to reset the port. None 111. 111. When configuring port security on a port that contains a VoIP phone with a voice VLAN and a computer connected to the phone, how many MAC addresses must you allow? A. 1 MAC address B. 2 MAC addresses C. 0 MAC addresses D. 10 MAC addresses None 112. 112. What is the default action of port security on the interface when the maximum number of MAC addresses is exceeded? A. Administrative shutdown B. Err-disabled shutdown C. Restricted access without logging D. Restricted access with logging None 113. 113. You are configuring a port for port security and receive the error Command rejected: FastEthernet0/1 is a dynamic port. Which commands will help you configure the port? A. SwitchA(config-if)#no switchport dynamicSwitchA(config-if)#switchport port-securityB. SwitchA(config-if)#switchport mode accessSwitchA(config-if)#switchport port-securityC. SwitchA(config-if)#switchport mode accessSwitchA(config-if)#switchportnonnegotiateSwitchA(config-if)#switchport port-securityD. SwitchA(config-if)#switchport mode accessSwitchA(config-if)#no dynamicSwitchA(configif)#switchport port-security A. Option A B. Option B C. Option C D. Option D None 114. 114. Which command will allow you to configure two MAC addresses for port security? A. SwitchA(config-if)#switchport maximum 2 B. SwitchA(config-if)#switchport port-security maximum 2 C. SwitchA(config-if)#port-security maximum 2 D. SwitchA(config-if)#switchport port-security limit 2 None 115. 115. Which command will limit devices via port security without disabling the port and logging the restricted device? A. Switch(config-if)#switchport port-security violation shutdown B. Switch(config-if)#switchport port-security restrict C. Switch(config-if)#switchport port-security violation protect D. Switch(config-if)#switchport port-security violation restrict None 116. 116. Which command will allow you to inspect the status of a port that has been configured for port security? A. Switch#show running-configuration B. Switch#show port-security interface gi 2/13 C. Switch#show port-security details interface gi 2/13 D. Switch#show port-security gi 2/13 None 117. 117. Which command will limit devices via port security and send an SNMP trap notification? A. Switch(config-if)#switchport port-security violation shutdown B. Switch(config-if)#switchport port-security restrict C. Switch(config-if)#switchport port-security violation protect D. Switch(config-if)#switchport port-security violation restrict None 118. 118. Which command will limit devices via port security without disabling the port and not provide logging for a security violation counter? A. Switch(config-if)#switchport port-security violation shutdown B. Switch(config-if)#switchport port-security restrict C. Switch(config-if)#switchport port-security violation protect D. Switch(config-if)#switchport port-security violation restrict None 119. 119. Which command will allow you to see logged security violations for port security? A. Switch#show violations B. Switch#show port-security violations C. Switch#show port-security D. Switch#show psec violations None 120. 120. You have been tasked to secure ports with port security. You need to make sure that only the computers installed can access the network. The computers are installed already. Which type of configuration for port security would require the least amount of administration? A. Static port security B. Dynamic port security C. Sticky port security D. Time limit port security None 121. 121. Refer to the following exhibit. You received a call that a port is no longer active. The port has port security configured on it. What is the problem? A. The port has been administratively shutdown. B. The port has an access violation on it. C. The port has bad wiring. D. The port on the switch is configured as a trunk. None 122. 122. Which command will allow the first MAC address learned on the port to be allowed to only pass traffic on the port via port security? A. SwitchA(config-if)#switchport port-security mac-address sticky B. SwitchA(config-if)#switchport port-security mac-address dynamic C. SwitchA(config-if)#switchport port-security mac-address static D. SwitchA(config-if)#switchport port-security mac-address learn None 123. 123. Refer to the following exhibit. You receive a call that a port on the switch is not working. You determine that a port-security violation has been experienced. Once the violation has been remediated, how will you reset the port so that it functions again? A. SwitchA(config-if)#no port-securityB. SwitchA(config-if)#no shutdownC. SwitchA(config-if)#no switchport port-securityD. SwitchA(config-if)#shutdownSwitchA(config-if)#no shutdown A. Option A B. Option B C. Option C D. Option D None 124. 124. Which command will configure the port with only the MAC address you want to allow via port security? A. SwitchA(config-if)#switchport port-security mac-address sticky B. SwitchA(config-if)#switchport port-security mac-address 0334.56f3.e4e4 C. SwitchA(config-if)#switchport port-security mac-address static 0334.56f3.e4e4 D. SwitchA(config-if)#switchport port-security static 0334.56f3.e4e4 None 125. 125. Which command is used to see the output in the following exhibit? A. Switch#show port-security details B. Switch#show mac address-table secure C. Switch#show port-security address D. Switch#show port-security None 126. 126. Which command will allow you to globally reset all ports with an errdisable state with minimal disruption? A. Switch#clear err-disable B. Switch#clear switchport port-security C. Switch#clear port-security violation D. Switch(config)#errdisable recovery cause psecure_violation None 127. 127. You need to verify the sticky MAC addresses learned on a port on the switch. Which command will allow you to verify the addresses learned? A. SwitchA#show running-config B. SwitchA#show port-security C. SwitchA#show port-security details D. SwitchA#show port-security status None 128. 128. Which server will centralize authentication for all Cisco routers and switches? A. Active Directory server B. AAA server C. 802.1X server D. Terminal server None 129. 129. Which protocol and port does RADIUS authentication use? A. UDP/1845 B. UDP/1645 C. TCP/1645 D. UDP/1911 None 130. 130. Which is an authentication protocol for AAA servers to secure Telnet authentication? A. 802.1X B. TACACS+ C. AD D. EAP None 131. 131. Which command will configure the router to use a TACACS+ server and a backup of local for authentication of logins? A. Router(config)#aaa authentication login default group tacacs+ local B. Router(config)#authentication login group tacacs+ local C. Router(config)#aaa-authentication login default tacacs+ local D. Router(config)#aaa authentication login tacacs+ local None 132. 132. You configured the AAA authentication for login to default local but forgot to create a local AAA user. What will happen when you log out? A. The enable secret will work. B. The console will still be available. C. The router will lock you out. D. Nothing, since a username and password have not been set. None 133. 133. You were routinely looking at logs and found that a security incident occurred. Which type of incident detection is described? A. Passive B. Active C. Proactive D. Auditing None 134. 134. A RADIUS server is an example of which type of server? A. DNS B. Email C. Proxy D. Authentication None 135. 135. Matilda is interested in securing her SOHO wireless network. What should she do to be assured that only her devices can join her wireless network? A. Enable WPA2 B. Enable MAC filtering C. Enable port security D. Disable SSID broadcasts None 136. 136. Which is a requirement of WPA2-Enterprise? A. Creation of a PSK B. Certificate infrastructure C. 192-bit key strength D. 802.11ac None 137. 137. Which mechanism in WPA prevents the altering and replay of data packets? A. TKIP B. MIC C. AES D. CRC None 138. 138. Which security mode does WPA3-Enterprise use that offers the highest level of security? A. 64-bit B. 128-bit C. 192-bit D. 256-bit None 139. 139. Which statement is correct about WPA? A. WPA was released at the same time as WEP. B. WPA was released as a fix for poor coverage. C. WPA was released as a fix for poor encryption. D. The Wi-Fi Alliance wanted to rebrand WEP with WPA None 140. 140. Which feature does 802.11i add to the WPA security protocol? A. The use of certificates B. Frame-level encryption C. Pre-shared keys D. CRC checking None 141. 141. Which mode of encryption does 802.11i (WPA2) introduce? A. RC4 B. MD5 C. AES-CCMP D. SHA1 None 142. 142. Which feature was introduced with WPA3 to enhance security? A. Certificate support B. Per-frame encryption C. SAE authentication D. TKIP None 143. 143. When configuring WPA2-Enterprise mode on a wireless LAN controller, what must be configured? A. NTP server B. RADIUS server C. PSK D. Captive portal None 144. 144. When configuring WPA2, you want to ensure that it does not fall back to the older WPA specification. What parameter should you disable? A. 802.1X B. AES C. TKIP D. MAC filtering None 145. 145. What is the mechanism that allows for authentication using a symmetrical key with WPA2? A. PSK B. AES C. Certificates D. TKIP None 146. 146. After configuring a WLAN, your users complain that they do not see the SSID. What could be wrong? A. SSID beaconing is enabled. B. Multicast support is disabled. C. Radio Policy is configured to all. D. Status is disabled. None 147. 147. How many pre-shared keys can be configured for a specific WPA2 WLAN? A. One PSK (one hex or one ASCII) B. Two PSKs (one hex and one ASCII) C. Four PSKs (two hex and two ASCII) D. Unlimited number of PSKs None 148. 148. You are configuring a WPA2 WLAN. Which security configuration should you use for the highest level of security? A. WPA-AES B. WPA2-TKIP C. WPA2-RC4 D. WPA2-AES None 149. 149. You are setting up a wireless network for a client. Their requirements are to minimize the infrastructure and support the highest security. Which wireless encryption standard should be configured to satisfy the requirements? A. WPA-Enterprise B. WPA2-Personal C. WPA3-Enterprise D. WPA-Personal None 150. 150. Which protocol will restrict you from achieving high throughput rates? A. AES B. TKIP C. CCMP D. PSK None 1 out of 150 Time's up