Professional Documents
Culture Documents
0 Exam 2017
We are trying to update every second to help you pass the exam.
Home ITE (IT Essentials) CCNA1 CCNA2 CCNA3 CCNA4 CCNA Security
https://www.ccna7.com/ccna-security-exam-answer-v1-2/ccna-security-chapter-1-exam-v1-2/ 1/11
28/8/2017 CCNA Security Chapter 1 Exam v1.2 - CCNA v6.0 Exam 2017
Examples include smurf attacks and ping of death Linux Essentials (LPI-010)
attacks.* LPIC-1 101
LPIC-1 102
3. Users report to the helpdesk that icons usually seen Microsoft Learning
on the menu bar are randomly appearing on their Window Tip
computer screens. What could be a reason that
computers are displaying these random graphics?
buffer overflow*
ping sweep
port redirection*
trust exploitation*
port scan
Internet information query
https://www.ccna7.com/ccna-security-exam-answer-v1-2/ccna-security-chapter-1-exam-v1-2/ 2/11
28/8/2017 CCNA Security Chapter 1 Exam v1.2 - CCNA v6.0 Exam 2017
6.
What
is a
chara
cterist
ic of a
Trojan
Horse
?
HAZ DEPORTE
containment phase*
inoculation phase
quarantine phase
treatment phase
https://www.ccna7.com/ccna-security-exam-answer-v1-2/ccna-security-chapter-1-exam-v1-2/ 3/11
28/8/2017 CCNA Security Chapter 1 Exam v1.2 - CCNA v6.0 Exam 2017
virus*
worm
proxy Trojan horse
Denial of Service Trojan horse
Denial of Service
port redirection
reconnaissance*
trust exploitation
enabling vulnerability*
infecting vulnerability
payload*
penetration mechanism
probing mechanism
propagation mechanism*
virus scanning
data encryption
anti-spoofing technologies*
intrusion protection systems*
applying user authentication
containment
inoculation
quarantine
treatment*
https://www.ccna7.com/ccna-security-exam-answer-v1-2/ccna-security-chapter-1-exam-v1-2/ 7/11
28/8/2017 CCNA Security Chapter 1 Exam v1.2 - CCNA v6.0 Exam 2017
trust exploitation
buffer overflow
man in the middle*
port redirection
authorization of actions
DHCP snooping
dynamic ARP inspection
login and password policy
routing protocol authentication*
role-based access control
access attack
Denial of Service attack
reconnaissance attack*
spoofing attack
port scanner
ping sweeper
packet sniffer*
Internet information query
29. What are two reasons for securing the data plane in
the Cisco NFP framework? (Choose two.)
https://www.ccna7.com/ccna-security-exam-answer-v1-2/ccna-security-chapter-1-exam-v1-2/ 8/11
28/8/2017 CCNA Security Chapter 1 Exam v1.2 - CCNA v6.0 Exam 2017
availability*
connectivity
confidentiality*
disclosure
integrity*
safety
asset management
communication and network management
risk assessment
security policy*
CERT*
CIS
(ISC)2
SANS
It deters hacking.*
It provides content filtering.
It protects from DoS attacks.
It prevents open ports from being used in an improper
manner.
https://www.ccna7.com/ccna-security-exam-answer-v1-2/ccna-security-chapter-1-exam-v1-2/ 9/11
28/8/2017 CCNA Security Chapter 1 Exam v1.2 - CCNA v6.0 Exam 2017
Comments
0 comments
0 Comments Sort by
Add a comment...
https://www.ccna7.com/ccna-security-exam-answer-v1-2/ccna-security-chapter-1-exam-v1-2/ 10/11
28/8/2017 CCNA Security Chapter 1 Exam v1.2 - CCNA v6.0 Exam 2017
Ad corazon-deoro.com ccna7.com
Home | CCNA Exam ITE (IT Essentials) CCNA1 CCNA2 CCNA3 CCNA4
https://www.ccna7.com/ccna-security-exam-answer-v1-2/ccna-security-chapter-1-exam-v1-2/ 11/11