CCNA 3 v7 Modules 3 - 5: Network Security Exam

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/65

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

66 Terms

1
New cards

What type of malware has the primary objective of spreading across the network?

worm

2
New cards

What is a ping sweep?

a network scanning technique that indicates the live hosts in a range of IP addresses.

3
New cards

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

integrity

4
New cards

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

a private key

5
New cards

Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)

destination UDP port number

ICMP message type

6
New cards

What type of ACL offers greater flexibility and control over network access?

extended

7
New cards

What is the quickest way to remove a single ACE from a named ACL?

Use the no keyword and the sequence number of the ACE to be removed.

8
New cards

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)

Router1(config)# access-list 10 permit host 192.168.15.23

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0

9
New cards

A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.)

Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255

Router(config)# access-list 95 permit any

10
New cards

Consider the following access list.

access-list 100 permit ip host 192.168.10.1 anyaccess-list 100 deny icmp 192.168.10.0 0.0.0.255 any echoaccess-list 100 permit ip any any

Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)

Devices on the 192.168.10.0/24 network can sucessfully ping devices on the 192.168.11.0 network.

A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned.

11
New cards

In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?

SYN flood attack

12
New cards

28. Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?

DCHP

13
New cards

Which statement describes a characteristic of standard IPv4 ACLs?

They filter traffic based on source IP addresses only.

14
New cards

What is considered a best practice when configuring ACLs on vty lines?

Place identical restrictions on all vty lines.

15
New cards

Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

16
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the any configuration option or command?

to identify any IP address

17
New cards

Which statement accurately characterizes the evolution of threats to network security?

Internal threats can cause even greater damage than external threats.

18
New cards

Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)

host

any

The host keyword is used when using a specific device IP address in an ACL. For example, the deny host 192.168.5.5 command is the same is the deny 192.168.5.5 0.0.0.0 command. The any keyword is used to allow any mask through that meets the criteria. For example, the permit any command is the same as permit 0.0.0.0 255.255.255.255 command.

19
New cards

Which statement describes a difference between the operation of inbound and outbound ACLs?

Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.

With an inbound ACL, incoming packets are processed before they are routed. With an outbound ACL, packets are first routed to the outbound interface, then they are processed. Thus processing inbound is more efficient from the router perspective. The structure, filtering methods, and limitations (on an interface, only one inbound and one outbound ACL can be configured) are the same for both types of ACLs.

20
New cards

What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255 any eq www command have when implemented inbound on the f0/0 interface?

Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations.

21
New cards

Which ACE will permit a packet that originates from any network and is destined for a web server at 192.168.1.1?

access-list 101 permit tcp any host 192.168.1.1 eq 80

22
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?

to secure administrative access to the router

23
New cards

What is the term used to describe the same pre-shared key or secret key, known by both the sender and receiver to encrypt and decrypt data?

symmetric encryption algorithm

24
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the 'ip access-group 101 in' configuration option or command?

to apply an extended ACL to an interface

25
New cards

In which type of attack is falsified information used to redirect users to malicious Internet sites?

DNS cache poisoning

26
New cards

What is a feature of an IPS?

It can stop malicious packets.

27
New cards

What does the CLI prompt change to after entering the command ip access-list standard aaa from global configuration mode?

Router(config-std-nacl)#

28
New cards

Refer to the exhibit. Many employees are wasting company time accessing social media on their work computers. The company wants to stop this access. What is the best ACL type and placement to use in this situation?

extended ACLs inbound on R1 G0/0 and G0/1

29
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the 40 deny host 192.168.23.8 configuration option or command?

to create an entry in a numbered ACL

30
New cards

What wild card mask will match networks 172.16.0.0 through 172.19.0.0?

0.3.255.255

31
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the no ip access-list 101 configuration option or command?

to remove a configured ACL

32
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the ip access-group 101 in configuration option or command?

to apply an extended ACL to an interface

33
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the remark configuration option or command?

to add a text entry for documentation purposes

34
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the established configuration option or command?

to allow returning reply traffic to enter the internal network

35
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the deny configuration option or command?

to restrict specific traffic access through an interface

36
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the host configuration option or command?

to identify one specific IP address

37
New cards

What specialized network device is responsible for enforcing access control policies between networks?

Intrusion detection system (IDS)

38
New cards

Which type of DNS attack involves the cybercriminal compromising a parent domain and creating multiple subdomains to be used during the attacks?

tunneling

39
New cards

Which two types of hackers are typically classified as grey hat hackers? (Choose two.)

Vulnerability brokers

Hacktivists

40
New cards

Which penetration testing tool uses algorithm schemes to encode the data, which then prevents access to the data?

Encryption tools

41
New cards

Which penetration testing tool is used by black hats to reverse engineer binary files when writing exploits? They are also used by white hats when analyzing malware.

Debuggers

42
New cards

Which penetration testing tool is used to probe and test a firewall's robustness?

Packet crafting tools

43
New cards

Which penetration testing tool is used by white hat hackers to sniff out any trace of evidence existing in a computer?

Forensic tools

44
New cards

Which penetration testing tool identifies whether a remote host is susceptible to a security attack?

Vulnerability exploitation tools

45
New cards

What type of attack is tailgaiting?

Social engineering

46
New cards

What type of attack is a password attack?

Access

47
New cards

What type of attack is port scanning?

Reconnaissance

48
New cards

What type of attack is man-in-the-middle?

Access

49
New cards

What type of attack is address spoofing?

Access

50
New cards

Which attack is being used when threat actors gain access to the physical network, and then use an MiTM attack to capture and manipulate a legitimate user's traffic?

Session hijacking

51
New cards

Which attack is being used when threat actors initiate a simultaneous, coordinated attack from multiple source machines?

Amplification and reflection attacks

52
New cards

Which attack exploits the three-way handshake?

TCP SYN flood attack

53
New cards

Two hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both hosts informing them to immediately stop using the TCP connection. Which attack is this?

TCP reset attack

54
New cards

Which attack is being used when the threat actor spoofs the IP address of one host, predicts the next sequence number, and sends an ACK to the other host?

TCP session hijacking

55
New cards

A program sends a flood of UDP packets from a spoofed host to a server on the subnet sweeping through all the known UDP ports looking for closed ports. This will cause the server to reply with an ICMP port unreachable message. Which attack is this?

UDP flood attack

56
New cards

- Ensures that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts

(ASA) firewall

57
New cards

Contains a secure database of who is authorized to access and manage network devices

AAA server

58
New cards

filters known and suspicious internet malware sites

ESA/WSA

59
New cards

security devices provides secure services with corporate sites and remote access support for remote users using secure encrypted tunnels

VPN

60
New cards

- monitors incoming and outgoing traffic looking for malware, network attack signatures, etc.

- stops threats immediately

IPS

61
New cards

Encrypts data one byte or one bit at a time

stream cipher

62
New cards

stream cipher that is used to secure web traffic in SSL and TLS

Rivest cipher

63
New cards

uses a set of rules called signatures to detect patterns in network traffic

IPS

64
New cards

cybercriminal compromises a parent domain and created multiple subdomains to be used during the attacks

shadowing

65
New cards

What wildcard mask corresponds with the "host" keyword, permitting a single host?

0.0.0.0

66
New cards

What wildcard mask corresponds with the "any" keyword, permitting all hosts?

255.255.255.255