Last Updated on October 29, 2019 by Admin
CCNA CyberOps Chapter 5 Exam Online
CCNA CyberOps 1.1 -- Chapter 5 Exam
Quiz-summary
0 of 28 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
Information
CCNA CyberOps 1.1 — Chapter 5 Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 28 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- Answered
- Review
-
Question 1 of 28
1. Question
2 pointsA Cisco router is running IOS 15. What are the two routing table entry types that will be added when a network administrator brings an interface up and assigns an IP address to the interface? (Choose two.)
Correct
Incorrect
A local route interface routing table entry is found when a router runs IOS 15 or higher or if IPv6 routing is enabled. Whenever an interface is addressed and enabled (made active), a directly connected interface is automatically shown in the routing table.
Hint
A local route interface routing table entry is found when a router runs IOS 15 or higher or if IPv6 routing is enabled. Whenever an interface is addressed and enabled (made active), a directly connected interface is automatically shown in the routing table.
-
Question 2 of 28
2. Question
2 pointsWhat are two types of addresses found on network end devices? (Choose two.)
Correct
Incorrect
Intermediary devices use two types of addresses when sending messages to the final destination device, MAC and IP addresses. TCP and UDP are protocols used at Layer 4 to identify what port numbers are being used on the source and destination devices. A return address is used when mailing a letter, not in networking.
Hint
Intermediary devices use two types of addresses when sending messages to the final destination device, MAC and IP addresses. TCP and UDP are protocols used at Layer 4 to identify what port numbers are being used on the source and destination devices. A return address is used when mailing a letter, not in networking.
-
Question 3 of 28
3. Question
1 pointsWhat information within a data packet does a router use to make forwarding decisions?
Correct
Incorrect
-
Question 4 of 28
4. Question
1 pointsWhich OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments?
Correct
Incorrect
When a router forwards traffic between LAN segments it encapsulates the Layer 2 frame to determine the Layer 3 path. Once the Layer 3 path is determined, the router encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2 addressing infomation for the destination LAN segment.
Hint
When a router forwards traffic between LAN segments it encapsulates the Layer 2 frame to determine the Layer 3 path. Once the Layer 3 path is determined, the router encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2 addressing infomation for the destination LAN segment.
-
Question 5 of 28
5. Question
1 pointsWhich parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?
Correct
Incorrect
The SSID is used to name a wireless network. This parameter is required in order for a wireless client to attach to a wireless AP.
Hint
The SSID is used to name a wireless network. This parameter is required in order for a wireless client to attach to a wireless AP.
-
Question 6 of 28
6. Question
1 pointsFor which discovery mode will an AP generate the most traffic on a WLAN?
Correct
Incorrect
The two discovery modes are passive and active. When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and open mode refers to security parameter settings.
Hint
The two discovery modes are passive and active. When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and open mode refers to security parameter settings.
-
Question 7 of 28
7. Question
1 pointsWhich wireless parameter is used by an access point to broadcast frames that include the SSID?
Correct
Incorrect
The two scanning or probing modes an access point can be placed into are passive or active. In passive mode, the AP advertises the SSID, supported standards, and security settings in broadcast beacon frames. In active mode, the wireless client must be manually configured for the same wireless parameters as the AP has configured.
Hint
The two scanning or probing modes an access point can be placed into are passive or active. In passive mode, the AP advertises the SSID, supported standards, and security settings in broadcast beacon frames. In active mode, the wireless client must be manually configured for the same wireless parameters as the AP has configured.
-
Question 8 of 28
8. Question
1 pointsWhich device can control and manage a large number of corporate APs?
Correct
Incorrect
A wireless LAN controller (WLC) can be configured to manage multiple lightweight access points (LWAPs). On the WLC, a network administrator can configure SSIDs, security, IP addressing, and other wireless network parameters in a centralized management environment.
Hint
A wireless LAN controller (WLC) can be configured to manage multiple lightweight access points (LWAPs). On the WLC, a network administrator can configure SSIDs, security, IP addressing, and other wireless network parameters in a centralized management environment.
-
Question 9 of 28
9. Question
1 pointsWhat is a function of a proxy firewall?
Correct
Incorrect
Proxy firewalls filter traffic through the application layer of the TPC/IP model and shield client information by connecting to remote servers on behalf of clients.
Hint
Proxy firewalls filter traffic through the application layer of the TPC/IP model and shield client information by connecting to remote servers on behalf of clients.
-
Question 10 of 28
10. Question
1 pointsWhat is the role of an IPS?
Correct
Incorrect
For detecting malicious activity, an IPS uses a set of rules called signatures to detect patterns in network traffic.
Hint
For detecting malicious activity, an IPS uses a set of rules called signatures to detect patterns in network traffic.
-
Question 11 of 28
11. Question
2 pointsWhich two features are included by both TACACS+ and RADIUS protocols? (Choose two.)
Correct
Incorrect
Both TACACS+ and RADIUS support password encryption (TACACS+ encrypts all communication) and use Layer 4 protocol (TACACS+ uses TCP and RADIUS uses UDP). TACACS+ supports separation of authentication and authorization processes, while RADIUS combines authentication and authorization as one process. RADIUS supports remote access technology, such as 802.1x and SIP; TACACS+ does not.
Hint
Both TACACS+ and RADIUS support password encryption (TACACS+ encrypts all communication) and use Layer 4 protocol (TACACS+ uses TCP and RADIUS uses UDP). TACACS+ supports separation of authentication and authorization processes, while RADIUS combines authentication and authorization as one process. RADIUS supports remote access technology, such as 802.1x and SIP; TACACS+ does not.
-
Question 12 of 28
12. Question
1 pointsWhat does the TACACS+ protocol provide in a AAA deployment?
Correct
Incorrect
TACACS+ utilizes TCP port 49, provides authorization on a per-user or per-group basis, encrypts the entire packet, and does not provide compatibility with previous TACACS protocols.
Hint
TACACS+ utilizes TCP port 49, provides authorization on a per-user or per-group basis, encrypts the entire packet, and does not provide compatibility with previous TACACS protocols.
-
Question 13 of 28
13. Question
1 pointsWhich protocol or service allows network administrators to receive system messages that are provided by network devices?
Correct
Incorrect
Cisco developed NetFlow for the purpose of gathering statistics on packets flowing through Cisco routers and multilayer switches. SNMP can be used to collect and store information about a device. Syslog is used to access and store system messages.
NTP is used to allow network devices to synchronize time settings.Hint
Cisco developed NetFlow for the purpose of gathering statistics on packets flowing through Cisco routers and multilayer switches. SNMP can be used to collect and store information about a device. Syslog is used to access and store system messages.
NTP is used to allow network devices to synchronize time settings. -
Question 14 of 28
14. Question
1 pointsWhich protocol or service is used to automatically synchronize the software clocks on Cisco routers?
Correct
Incorrect
Network Time Protocol (NTP) is used to allow network devices to synchronize their time settings with a centralized time server. DHCP (Dynamic Host Configuration Protocol) is a protocol which assigns IP addresses to hosts. DNS (Domain Name Service) is a service which resolves host names to IP addresses. SNMP (Simple Network Management Protocol) is a protocol which allows administrators to manage network nodes.
Hint
Network Time Protocol (NTP) is used to allow network devices to synchronize their time settings with a centralized time server. DHCP (Dynamic Host Configuration Protocol) is a protocol which assigns IP addresses to hosts. DNS (Domain Name Service) is a service which resolves host names to IP addresses. SNMP (Simple Network Management Protocol) is a protocol which allows administrators to manage network nodes.
-
Question 15 of 28
15. Question
1 pointsWhich protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?
Correct
Incorrect
Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.
Hint
Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.
-
Question 16 of 28
16. Question
1 pointsWhich protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
Correct
Incorrect
IPsec services allow for authentication, integrity, access control, and confidentiality. With IPsec, the information exchanged between remote sites can be encrypted and verified. Both remote-access and site-to-site VPNs can be deployed using IPsec.
Hint
IPsec services allow for authentication, integrity, access control, and confidentiality. With IPsec, the information exchanged between remote sites can be encrypted and verified. Both remote-access and site-to-site VPNs can be deployed using IPsec.
-
Question 17 of 28
17. Question
1 pointsWhat is a feature of the TACACS+ protocol?
Correct
Incorrect
TACACS+ has the following features:separates authentication and authorization
encrypts all communication
uses TCP port 49Hint
TACACS+ has the following features:separates authentication and authorization
encrypts all communication
uses TCP port 49 -
Question 18 of 28
18. Question
2 pointsWhich two statements are true about NTP servers in an enterprise network? (Choose two.)
Correct
Incorrect
Network Time Protocol (NTP) is used to synchronize the time across all devices on the network to make sure accurate timestamping on devices for managing, securing and troubleshooting. NTP networks use a hierarchical system of time sources. Each level in this hierarchical system is called a stratum. The stratum 1 devices are directly connected to the authoritative time sources.
Hint
Network Time Protocol (NTP) is used to synchronize the time across all devices on the network to make sure accurate timestamping on devices for managing, securing and troubleshooting. NTP networks use a hierarchical system of time sources. Each level in this hierarchical system is called a stratum. The stratum 1 devices are directly connected to the authoritative time sources.
-
Question 19 of 28
19. Question
2 pointsWhat are two uses of an access control list? (Choose two.)
Correct
Incorrect
ACLs can be used for the following:Limit network traffic in order to provide adequate network performance
Restrict the delivery of routing updates
Provide a basic level of security
Filter traffic based on the type of traffic being sent
Filter traffic based on IP addressingHint
ACLs can be used for the following:Limit network traffic in order to provide adequate network performance
Restrict the delivery of routing updates
Provide a basic level of security
Filter traffic based on the type of traffic being sent
Filter traffic based on IP addressing -
Question 20 of 28
20. Question
1 pointsWhat is the only attribute used by standard access control lists to identify traffic?
Correct
Incorrect
Standard access control lists can only identify traffic based on the source IPv4 address in the protocol header.
Hint
Standard access control lists can only identify traffic based on the source IPv4 address in the protocol header.
-
Question 21 of 28
21. Question
1 pointsWhich layer of the hierarchical design model is a control boundary between the other layers?
Correct
Incorrect
The three design layers from lowest to highest are access, distribution, and core. The distribution layer commonly provides policy-based connectivity which permits or denies traffic based on predefined parameters. The distribution layer also acts as a control boundary between the access and core layers.
Hint
The three design layers from lowest to highest are access, distribution, and core. The distribution layer commonly provides policy-based connectivity which permits or denies traffic based on predefined parameters. The distribution layer also acts as a control boundary between the access and core layers.
-
Question 22 of 28
22. Question
1 pointsWhat is true concerning physical and logical topologies?
Correct
Incorrect
Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes.
Hint
Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes.
-
Question 23 of 28
23. Question
1 pointsRefer to the exhibit. The network “A” contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as “A”?
Correct
Incorrect
A demilitarized zone or DMZ is a network area protected by one or more firewalls. The DMZ typically contains servers that are commonly accessed by external users. A web server is commonly contained in a DMZ.
Hint
A demilitarized zone or DMZ is a network area protected by one or more firewalls. The DMZ typically contains servers that are commonly accessed by external users. A web server is commonly contained in a DMZ.
-
Question 24 of 28
24. Question
1 pointsWhat is the function of the distribution layer of the three-layer network design model?
Correct
Incorrect
The function of the distribution layer is to provide connectivity to services and to aggregate the access layer connections
Hint
The function of the distribution layer is to provide connectivity to services and to aggregate the access layer connections
-
Question 25 of 28
25. Question
1 pointsWhich LAN topology requires a central intermediate device to connect end devices?
Correct
Incorrect
In a star network topology end devices are connected to a central intermediate device such as a hub or a switch.
Hint
In a star network topology end devices are connected to a central intermediate device such as a hub or a switch.
-
Question 26 of 28
26. Question
6 pointsMatch each device to a category.
Sort elements
- PC
- printer
- smart device
- firewall
- router
- switch
-
end devices Target
-
end devices Target
-
end devices Target
-
intermediary devices Target
-
intermediary devices Target
-
intermediary devices Target
Correct
Incorrect
-
Question 27 of 28
27. Question
4 pointsMatch the destination network routing table entry type with a defintion.
Sort elements
- local route interface
- directly connected interface
- dynamic route
- static route
-
found only in routers running IOS 15+ or IPv6 routing
-
automatically added when an interface is configured and active
-
added when a protocol such as OSPF or EIGRP discovers a route
-
manually configured by a network administrator
Correct
Incorrect
-
Question 28 of 28
28. Question
4 pointsMatch the network security device type with the description.
Sort elements
- IPS
- packet filter firewall
- stateful firewall
- application gateway
-
uses signatures to detect patterns in network traffic
-
enforces an access control policy based on packet content
-
filters traffic based on defined rules as well as connection context
-
filters traffic on Layer 7 information
Correct
Incorrect