Module 2 Practice Questions

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

flashcard set

Earn XP

Description and Tags

This covers chapters 3 & 4 from the SCOR cert guide

Last updated 1:06 PM on 3/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

47 Terms

1
New cards

Which of the following are the three different “planes” in traditional networking?

The management, control, and data planes

2
New cards

Which of the following is true about Cisco ACI?

All of these answers are correct

3
New cards

Which of the following is used to create network overlays?

VXLAN

4
New cards

Which of the following is an identifier or a tag that represents a logical segment?

VXLAN Network Identifier (VNID)

5
New cards

Which of the following is network traffic between servers (virtual servers or physical servers), containers and so on?

East-west traffic

6
New cards

which of the following is an HTTP status code message range related to successful HTTP transactions?

Messages in the 200 range

7
New cards

Which of the following is a Python package that can be used to interact with REST APIs?

requests

8
New cards

Which of the following is a type of API that exclusively uses XML

SOAP

9
New cards

Which of the following is a modern framework of API documentation and is now the basis of the OpenAPI Specification (OAS)?

swagger

10
New cards

Which of the following can be used to retrieve a network device configuration?

All of these answers are correct

11
New cards

The RESTCONF interface is built around a small number of standardized requests. Which of the following are requests supported by RESTCONF?

All of these answers are correct

12
New cards

NETCONF messages are encoded in a(n) ____ structure defined by the NETCONF standard

XML

13
New cards

Which of the following is a Cisco resource where you can learn about network programmability and obtain sample code?

DevNet

14
New cards

A YANG-based server publishes a set of YANG modules which taken together form the system’s ____

YANG model

15
New cards

Which of the following HTTP methods sends data to the server typically used in HTML forms and API requests

POST

16
New cards

Which of the following is a solution that allows you to detect security threats in encrypted traffic without decrypting the packets

ETA

17
New cards

Which of the following is an open-source project that allows you to deploy micro-segmentation policy-based services in container environments?

Contiv

18
New cards

NFV nodes such as virtual routers and firewall need which of the following components as an underlying infrastructure?

All of these answers are correct

19
New cards

There have been multiple IP tunneling mechanism introduced throughout the years. Which of the following are examples of IP tunneling mechanisms?

All of these answers are correct

20
New cards

Which of the following is true about SDN?

All of these answers are correct

21
New cards

You were hires to configure AAA services in an organization and are asked to make sure that users in the engineering department do not have access to resource that are only meant for the finance department. What authorization principle addresses this scenario?

The principle of least privilege and separation of duties

22
New cards

Which of the following describes the type of authentication where the user provides a secret that is only known by them.

Authentication by knowledge

23
New cards

Which of the following is a set of characteristics that can be used to prove a subject’s identity one time and one time only?

One-time passcode (OTP)

24
New cards

Which of the following is an open standard for exchanging authentication and authorization data between identity providers, and is used in many single sign-on (SSO) implementations?

SAML

25
New cards

Which of the following defines how access rights and permission are granted. Examples of that model include object capability, security labels, and ACLs?

An authorization model

26
New cards

An authorization policy should always implement which of the following concepts? (Select all that apply.)

Implicit deny & Need to know

27
New cards

Which of the following is the process of auditing and monitoring what a user does once a specific resource is accessed?

Accounting

28
New cards

Access control lists classify packets by inspecting Layer 2 through Layer 7 headers for a number of parameters, including which of the following?

All of these options are correct.

29
New cards

Which of the following statements are true?

All of these answers are correct.

30
New cards

Network access devices (such as network switches and wireless access points) can use an IEEE protocol than when enabled, will allow traffic on the port only after the device has been authenticated and authorized. Which of the following is an IEEE standard that is used to implement port-based access control?

802.1X

31
New cards

Which of the following provides a cross-platform integration capability between security monitoring applications, threat detection systems, asset management platforms, network policy systems, and practically any other IT operations platform?

pxGrid

32
New cards

Which of the following are examples of some of the more popular policy attributes supported by Cisco ISE?

All of these options are correct

33
New cards

Which of the following commands enables AAA services on a Cisco router?

aaa new-model

34
New cards

Which of the following is the default behavior ofan 802.1X-enabled port?

To authorize only a single MAC address per port

35
New cards

Which of the following are Cisco ISE distributed node types?

All of these options are correct.

36
New cards

Which of the following is a security model created by Google that is similar to the zero-trust concept

BeyondCorp

37
New cards

Which of the following are technologies used in SSO implementations

All of these options are correct.

38
New cards

Which of the following is true about delegation in SSO implementations? (Select all that apply.)

a. SSO implementations use delegation to call

external APIs to authenticate and authorize

users.

b. Delegation is used to make sure that

applications and services do not store passwords

and user information on-premise

39
New cards

Which of the following statements are true about discretionary access controls (DACs)?

All of these options are correct.

40
New cards

RADIUS accounting runs over what protocol and port

UDP port 1813

41
New cards

Which of the following is one primary difference between a malicious hacker and an ethical hacker

Ethical hackers use the same methods but strive to do no harm.

42
New cards

You were hired to configure RADIUS authentication in a VPN implementation. You start RADIUS debugs in the VPN device and notice ACCESS-CHALLENGE messages. What do those messages mean?

ACCESS-CHALLENGE messages are sent if

additional information is needed. The RADIUS

server needs to send an additional challenge to

the access server before authenticating the user.

The ACCESS-CHALLENGE will be followed by a

new ACCESS-REQUEST message.

43
New cards

Which of the following are TACACS+ exchange packets used during the authentication process?

All of these options are correct.

44
New cards

Which of the following is an entity that seeks to be authenticated by an authenticator (switch, wireless access point, and so on)? This entity could use software such as the Cisco AnyConnect Secure Mobility Client.

Supplicant

45
New cards

802.1x uses which of the following protocols?

All of these options are correct.

46
New cards

Which of the following statements is true about

CoA?

RADIUS CoA is a feature that allows a RADIUS

server to adjust the authentication and

authorization state of an active client session.

47
New cards

The _________________ is a structured

replacement for feature-specific configuration

commands. This concept allows you to create

traffic policies based on events, conditions, and

actions.

Cisco Common Classification Policy Language

(C3PL)

Explore top notes

note
Verbs and Verb Tenses
Updated 1160d ago
0.0(0)
note
3.1 Intro to Culture
Updated 122d ago
0.0(0)
note
AP Statistics Unit 3 Notes
Updated 330d ago
0.0(0)
note
Plant Kingdom
Updated 898d ago
0.0(0)
note
Public Key / Llave Pública
Updated 1241d ago
0.0(0)
note
Eukaryotic Cells (Animal & Plant)
Updated 1194d ago
0.0(0)
note
Chapter 3: Proteins
Updated 991d ago
0.0(0)
note
Verbs and Verb Tenses
Updated 1160d ago
0.0(0)
note
3.1 Intro to Culture
Updated 122d ago
0.0(0)
note
AP Statistics Unit 3 Notes
Updated 330d ago
0.0(0)
note
Plant Kingdom
Updated 898d ago
0.0(0)
note
Public Key / Llave Pública
Updated 1241d ago
0.0(0)
note
Eukaryotic Cells (Animal & Plant)
Updated 1194d ago
0.0(0)
note
Chapter 3: Proteins
Updated 991d ago
0.0(0)

Explore top flashcards

flashcards
ĐỀ 7
20
Updated 74d ago
0.0(0)
flashcards
Intro to Healthcare quiz 1
22
Updated 945d ago
0.0(0)
flashcards
The New Government Begins
55
Updated 317d ago
0.0(0)
flashcards
GLW #2
20
Updated 188d ago
0.0(0)
flashcards
APUSH Unit 8 Test
46
Updated 1093d ago
0.0(0)
flashcards
ĐỀ 7
20
Updated 74d ago
0.0(0)
flashcards
Intro to Healthcare quiz 1
22
Updated 945d ago
0.0(0)
flashcards
The New Government Begins
55
Updated 317d ago
0.0(0)
flashcards
GLW #2
20
Updated 188d ago
0.0(0)
flashcards
APUSH Unit 8 Test
46
Updated 1093d ago
0.0(0)