Category: CCNA Security v2.0

Show Posts in

CCNA Security v2.0 Chapter 8 Exam Answers

1. Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router? It will be sent unencrypted.* It will be sent encrypted. It will be blocked. It will be discarded.   2. What three protocols must be …

CCNA Security v2.0 Chapter 7 Exam Answers

1. What is the focus of cryptanalysis? hiding secret codes developing secret codes breaking encrypted codes* implementing encrypted codes   2. How many bits does the Data Encryption Standard (DES) use for data encryption? 40 bits 56 bits* 64 bits 72 bits   3. Which statement describes the …

CCNA Security v2.0 Chapter 6 Exam Answers

1. Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown? The connection between S1 and PC1 is via a crossover …

CCNA Security v2.0 Chapter 5 Exam Answers

1. What information must an IPS track in order to detect attacks matching a composite signature? the total number of packets in the attack the attacking period used by the attacker the network bandwidth consumed by all packets the state of packets related to the attack*   2. …

CCNA Security v2.0 Chapter 4 Exam Answers

1. Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet? The initial packet is dropped, but subsequent packets …