CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 5 Exam Answers

Last Updated on October 18, 2019 by Admin

CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 5 Exam Answers 2019

  1. A Cisco router is running IOS 15. What are the two routing table entry types that will be added when a network administrator brings an interface up and assigns an IP address to the interface? (Choose two.)

    • directly connected interface
    • local route interface
    • route that is learned via EIGRP
    • route that is learned via OSPF
    • route that is manually entered by a network administrator
      Explanation:

      A local route interface routing table entry is found when a router runs IOS 15 or higher or if IPv6 routing is enabled. Whenever an interface is addressed and enabled (made active), a directly connected interface is automatically shown in the routing table.

  2. What are two types of addresses found on network end devices? (Choose two.)

    • IP
    • MAC
    • return
    • TCP
    • UDP
      Explanation:

      Intermediary devices use two types of addresses when sending messages to the final destination device, MAC and IP addresses. TCP and UDP are protocols used at Layer 4 to identify what port numbers are being used on the source and destination devices. A return address is used when mailing a letter, not in networking.

  3. What information within a data packet does a router use to make forwarding decisions?

    • the destination MAC address
    • the destination IP address
    • the destination host name
    • the destination service requested
      Explanation:

      A Layer 3 device like a router uses a Layer 3 destination IP address to make a forwarding decision.

  4. Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments?

    • Layer 2
    • Layer 3
    • Layer 4
    • Layer 7
      Explanation:

      When a router forwards traffic between LAN segments it encapsulates the Layer 2 frame to determine the Layer 3 path. Once the Layer 3 path is determined, the router encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2 addressing infomation for the destination LAN segment.

  5. Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?

    • ad hoc
    • BESS
    • ESS
    • SSID
      Explanation:

      The SSID is used to name a wireless network. This parameter is required in order for a wireless client to attach to a wireless AP.

  6. For which discovery mode will an AP generate the most traffic on a WLAN?

    • passive mode
    • open mode
    • mixed mode
    • active mode
      Explanation:

      The two discovery modes are passive and active. When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and open mode refers to security parameter settings.

  7. Which wireless parameter is used by an access point to broadcast frames that include the SSID?

    • active mode
    • channel setting
    • passive mode
    • security mode
      Explanation:

      The two scanning or probing modes an access point can be placed into are passive or active. In passive mode, the AP advertises the SSID, supported standards, and security settings in broadcast beacon frames. In active mode, the wireless client must be manually configured for the same wireless parameters as the AP has configured.

  8. Which device can control and manage a large number of corporate APs?

    • LWAP
    • router
    • switch
    • WLC
      Explanation:

      A wireless LAN controller (WLC) can be configured to manage multiple lightweight access points (LWAPs). On the WLC, a network administrator can configure SSIDs, security, IP addressing, and other wireless network parameters in a centralized management environment.

  9. What is a function of a proxy firewall?

    • connects to remote servers on behalf of clients
    • filters IP traffic between bridged interfaces
    • uses signatures to detect patterns in network traffic
    • drops or forwards traffic based on packet header information
      Explanation:

      Proxy firewalls filter traffic through the application layer of the TPC/IP model and shield client information by connecting to remote servers on behalf of clients.

  10. What is the role of an IPS?

    • to detect patterns of malicious traffic by the use of signature files
    • to enforce access control policies based on packet content
    • to filter traffic based on defined rules and connection context
    • to filter traffic based on Layer 7 information
      Explanation:

      For detecting malicious activity, an IPS uses a set of rules called signatures to detect patterns in network traffic.

  11. Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)

    • separate authentication and authorization processes
    • password encryption
    • utilization of transport layer protocols
    • SIP support
    • 802.1X support
      Explanation:

      Both TACACS+ and RADIUS support password encryption (TACACS+ encrypts all communication) and use Layer 4 protocol (TACACS+ uses TCP and RADIUS uses UDP). TACACS+ supports separation of authentication and authorization processes, while RADIUS combines authentication and authorization as one process. RADIUS supports remote access technology, such as 802.1x and SIP; TACACS+ does not.

  12. What does the TACACS+ protocol provide in a AAA deployment?

    • authorization on a per-user or per-group basis
    • AAA connectivity via UDP
    • compatibility with previous TACACS protocols
    • password encryption without encrypting the packet
      Explanation:

      TACACS+ utilizes TCP port 49, provides authorization on a per-user or per-group basis, encrypts the entire packet, and does not provide compa​tibility with previous TACACS protocols.​

  13. Which protocol or service allows network administrators to receive system messages that are provided by network devices?

    • syslog
    • NTP
    • SNMP
    • NetFlow
      Explanation:

      Cisco developed NetFlow for the purpose of gathering statistics on packets flowing through Cisco routers and multilayer switches. SNMP can be used to collect and store information about a device. Syslog is used to access and store system messages.
      NTP is used to allow network devices to synchronize time settings.

  14. Which protocol or service is used to automatically synchronize the software clocks on Cisco routers?

    • NTP
    • DHCP
    • DNS
    • SNMP
      Explanation:

      Network Time Protocol (NTP) is used to allow network devices to synchronize their time settings with a centralized time server. DHCP (Dynamic Host Configuration Protocol) is a protocol which assigns IP addresses to hosts. DNS (Domain Name Service) is a service which resolves host names to IP addresses. SNMP (Simple Network Management Protocol) is a protocol which allows administrators to manage network nodes.

  15. Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

    • OSPF
    • IPsec
    • IKE
    • GRE
      Explanation:

      Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.

  16. Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

    • AES
    • ESP
    • IPsec
    • MD5
      Explanation:

      IPsec services allow for authentication, integrity, access control, and confidentiality. With IPsec, the information exchanged between remote sites can be encrypted and verified. Both remote-access and site-to-site VPNs can be deployed using IPsec.

  17. What is a feature of the TACACS+ protocol?

    • It combines authentication and authorization as one process.
    • It encrypts the entire body of the packet for more secure communications.
    • It utilizes UDP to provide more efficient packet transfer.
    • It hides passwords during transmission using PAP and sends the rest of the packet in plaintext.
      Explanation:

      TACACS+ has the following features:separates authentication and authorization
      encrypts all communication
      uses TCP port 49

  18. Which two statements are true about NTP servers in an enterprise network? (Choose two.)

    • There can only be one NTP server on an enterprise network.
    • All NTP servers synchronize directly to a stratum 1 time source.
    • NTP servers at stratum 1 are directly connected to an authoritative time source.
    • NTP servers ensure an accurate time stamp on logging and debugging information.
    • NTP servers control the mean time between failures (MTBF) for key network devices.
      Explanation:

      Network Time Protocol (NTP) is used to synchronize the time across all devices on the network to make sure accurate timestamping on devices for managing, securing and troubleshooting. NTP networks use a hierarchical system of time sources. Each level in this hierarchical system is called a stratum. The stratum 1 devices are directly connected to the authoritative time sources.

  19. What are two uses of an access control list? (Choose two.)

    • ACLs assist the router in determining the best path to a destination.
    • Standard ACLs can restrict access to specific applications and ports.
    • ACLs provide a basic level of security for network access.
    • ACLs can permit or deny traffic based upon the MAC address originating on the router.
    • ACLs can control which areas a host can access on a network.
      Explanation:

      ACLs can be used for the following:Limit network traffic in order to provide adequate network performance
      Restrict the delivery of routing updates
      Provide a basic level of security
      Filter traffic based on the type of traffic being sent
      Filter traffic based on IP addressing

  20. What is the only attribute used by standard access control lists to identify traffic?

    • source MAC address
    • source IP address
    • source TCP port
    • protocol type
      Explanation:

      Standard access control lists can only identify traffic based on the source IPv4 address in the protocol header.

  21. Which layer of the hierarchical design model is a control boundary between the other layers?

    • access
    • core
    • distribution
    • network
      Explanation:

      The three design layers from lowest to highest are access, distribution, and core. The distribution layer commonly provides policy-based connectivity which permits or denies traffic based on predefined parameters. The distribution layer also acts as a control boundary between the access and core layers.

  22. What is true concerning physical and logical topologies?

    • The logical topology is always the same as the physical topology.
    • Physical topologies are concerned with how a network transfers frames.
    • Physical topologies display the IP addressing scheme of each network.
    • Logical topologies refer to how a network transfers data between devices.
      Explanation:

      Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes.

  23. Refer to the exhibit. The network “A” contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as “A”?

    CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 5 Exam Answers 2019 Full 100% 01

    CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 5 Exam Answers 2019 Full 100% 01

    • DMZ
    • internal network
    • perimeter security boundary
    • untrusted network
      Explanation:

      A demilitarized zone or DMZ is a network area protected by one or more firewalls. The DMZ typically contains servers that are commonly accessed by external users. A web server is commonly contained in a DMZ.

  24. What is the function of the distribution layer of the three-layer network design model?

    • providing direct access to the network
    • aggregating access layer connections
    • providing secure access to the Internet
    • providing high speed connection to the network edge
      Explanation:

      The function of the distribution layer is to provide connectivity to services and to aggregate the access layer connections

  25. Which LAN topology requires a central intermediate device to connect end devices?

    • bus
    • ring
    • mesh
    • star
      Explanation:

      In a star network topology end devices are connected to a central intermediate device such as a hub or a switch.

  26. Match each device to a category.

    CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 5 Exam Answers 2019 Full 100% 001

    CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 5 Exam Answers 2019 Full 100% 001

  27. Match the destination network routing table entry type with a defintion.

  28. Match the network security device type with the description.

    CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 5 Exam Answers 2019 Full 100% 003

    CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 5 Exam Answers 2019 Full 100% 003