0% found this document useful (0 votes)
180 views53 pages

3RD YEAR Network Security

The document contains a quiz about network security with multiple choice questions covering topics like network security, CIA triad, malware, OSI model layers, and cyber attacks. It aims to test the understanding of key concepts in network security.

Uploaded by

Melanie Buñales
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
180 views53 pages

3RD YEAR Network Security

The document contains a quiz about network security with multiple choice questions covering topics like network security, CIA triad, malware, OSI model layers, and cyber attacks. It aims to test the understanding of key concepts in network security.

Uploaded by

Melanie Buñales
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 53

NETWORK

SUCURITY
PRELIM QUIZ 1
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It will help the company to provide a better strategy in keeping a data secured while
avoiding intruders to alter or steal important and confidential information.

Select one:
a.
Network Security
b.
Network Administrator
c.
CIA Triad of Information
d.
Security Trinity
Feedback
Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Internet is an example of a network.

Select one:
True 
False

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It ensures that the information in an information system is accurate.

Select one:
a.
Availability
b.
Accountability
c.
Integrity
Feedback
Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question
Question text
It is a structured procedure for taking care of any security incidents, breaches, and network
threats.

Select one:
a.
Preventive

b.
Response
c.
Planning

d.
Detection
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
detect
It is the network security solution by an institute to Answer  any malicious
activity in a network.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Any form of security incident that is not properly handled can and eventually wont turn into
a bigger problem that will lead to a damaging data breach and wont cause large amount of
expense or it will collapse the whole system
Select one:
True
False 

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is the tangible parts of a computer system.

Select one:
a.
Software
b.
Hardware
c.
Peopleware
Feedback
Your answer is correct.

Question 8
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
An information that is only accessed by an authorized person.
Ensures
Answer: 

Question 9
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Big corporations are not at risks to any form of security breach.

Select one:
True
False 

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Areas of Security Trinity where they need to have a good security measures to avoid hackers
from getting access to the network.

Select one:
a.
Detection
b.
Response
c.
Prevention
Feedback
Your answer is correct.

Question 11
Correct
Mark 1.00 out of 1.00
Flag question

Question text
How many key phases are there in an incident response plan ?
6
Answer:

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is considered as a crucial part of information systems

Select one:
a.
Network
b.
Security

c.
Information

d.
Data
Feedback
Your answer is correct.

Question 13
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which of these are not part of the reason why we need to secure our network?

Select one:
a.
To exploit vulnerabilities in the system

b.
To secure company asset

c.
To gain a competitive advantage

d.
To keep your job

Feedback
Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a model designed to guide policies for information security within an organization.

Select one:
a.
AAA of Information

b.
Core Security Concepts

c.
Security Trinity
d.
CIA Triad Information Security
Feedback
Your answer is correct.

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Availability refers to the ability of a network to protect its information from any
unauthorized access.

Select one:
True
False 

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It determines whether you are allowed to access a specific information or file. 
Authorization
Answer: 

Question 17
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
System that plays a vital part in Network security since it is the information that an
organization is trying to protect and avoid from any unauthorized access
The security trinity
Answer: 

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
System that are intended to manage the computer itself such as the operating system.

Select one:
a.
Software
b.
Application

c.
Application Software
d.
System Software
Feedback
Your answer is correct.

Question 19
Correct
Mark 1.00 out of 1.00
Flag question

Question text
It has a vital role in an information system because it is the one that allows a company to
link their computers and its users

Select one:
a.
Switch
b.
Router
c.
Internet
d.
Network
Feedback
Your answer is correct.

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is the process of taking preventative measures to keep the network infrastructure from
any unauthorized access, misuse of important information
Netw ork security
Answer: 

PRELIM QUIZ 2
Question 1
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Type of malware that may contain an attachment to an email that loads malware onto your
computer system.
Phishing
Answer: 

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It pretends to be a legitimate programs in order to gain access to a system.

Select one:
a.
Adware
b.
Trojan Horse

c.
Virus
d.
Worms
Feedback
Your answer is correct.

Question 3
Correct
Mark 1.00 out of 1.00
Flag question

Question text
These are what make networks prone to information loss and downtime
Vulnerabilities
Answer: 

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What are the signs and symptoms that your device/s are getting infected by any malware.
(Choose all that applies)

Select one or more:


a.
Slower computer performance

b.
Software freezes or crashes

c.
Increased CPU usage

d.
Appearance of strange desktop icons
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00
Flag question

Question text
SQL stands for?

Select one:
a.
Structure Query Languaqe

b.
Structured Query Lanquage

c.
Structured Query Language

d.
Structure Query Language
Feedback
Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is an act that exploits a vulnerability.
Attack
Answer: 

Question 7
Correct
Mark 1.00 out of 1.00
Flag question

Question text
These layers work together to transmit the data from one person to another world wide.

Select one:
a.
0SI Layer
b.
OS1 Layer
c.
ISO Layer
d.
OSI Layer
Feedback
Your answer is correct.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This layer is also called human-computer interaction layer.
Application Layer
Answer: 

Question 9
Correct
Mark 1.00 out of 1.00

Flag question
Question text
It has been developed by ISO in the year 1984.

Select one:
a.
ISO Reference Model

b.
OS1 Reference Model

c.
OSI Reference Model
d.
0SI Reference Model
Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Worms can be classified as a type of computer virus that needs a third party or a user to
replicate and spread through the system.

Select one:
True
False 

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Brute force attack are often successful because most of the users uses different ordinary
words as their passwords.

Select one:
True
False 

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
any program design to damage specific file or computer system.

Select one:
a.
Malware
b.
Virus
Feedback
Your answer is correct.

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It provides data routing paths where data will take for network communication.

Select one:
a.
Data Link Layer
b.
Session Layer

c.
Physical Layer

d.
Network Layer
Feedback
Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Two different devices can communicate with each other regardless of the manufacturer as
long as they have the same protocol. 

Select one:
True 
False

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A type of malware that automatically sends advertisements to the users.

Select one:
a.
Adware

b.
Ransomware
c.
Spyware

d.
Advertising-supported software
Feedback
Your answer is correct.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This layer involves devices such as router, UTP Cables and other networking devices to
transfer data.

Select one:
a.
Session Layer
b.
Transport Layer

c.
Physical Layer
d.
Data Link Layer
Feedback
Your answer is correct.

Question 17
Correct
Mark 1.00 out of 1.00

Flag question
Question text
It may contain phishing scams and malware.
Spam
Answer: 

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a set of standards that are widely used as a basis for communication.
Protocol
Answer: 

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are not part of OSI Layer?

Select one:
a.
Physical Layer

b.
Transfer Layer
c.
Presentation Layer

d.
Session Layer
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is anything that can disrupt the operation, functioning, integrity, or availability of a
network or system
Threat
Answer: 

MIDTERM QUIZ 1
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
This service is the one responsible for handling connections to a remote network resources.
Select one:
a.
Server service

b.
Workstation service

c.
Messenger service

d.
Print Spooler service
Feedback
Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Without this service on your environment, you won't be able to share any of your resources
Select one:
a.
Messenger service

b.
Server service

c.
Workstation service

d.
Print Spooler service
Feedback
Your answer is correct.

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a software service that manages the process of printing in the Windows environment.
Select one:
a.
Workstation service

b.
Server service

c.
Messenger service
d.
Print Spooler service
Feedback
Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are the commands for disabling a port in a Network Switch. Choose any
that Apply
Select one or more:
a.
SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#no shutdown

b.
SWITCH>enable
SWITCH#config term
SWITCH(config)#interface range f0/4-8
SWITCH(config-if-range)#shutdown

c.
SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#shutdown

d.
SWITCH>enable
SWITCH#configure terminal
SWITCH(config)#interface f0/2
SWITCH(config-if)#no shutdown
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
is a crucial security update that you should always apply to your system
Select one:
a.
Service pack

b.
Patch

c.
Security hot-fix
Feedback
Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
NTFS and FAT/FAT32 is an example of?
File system
Answer: 

Question 7
Correct
Mark 1.00 out of 1.00
Flag question

Question text
It ensure that the essential and vital services are only running on the system
Services running
Answer: 

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is a service responsible for sending messages to other computers or users.
Select one:
a.
Server service

b.
Workstation service

c.
Messenger service

d.
Print Spooler service
Feedback
Your answer is correct.

Question 9
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which of the following are not part of the steps in order to harden your system. Choose only one.
Select one:
a.
Patch System

b.
Disable Unnecessary Services

c.
Uninstall Necessary Software

d.
Disable or Remove Unnecessary Accounts
Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A popular feature of Windows that allows you to harden multiple systems quickly.
Security Templates
Answer: 

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are the commands for disabling a port in a Network Switch. Choose any
that Apply
Select one or more:
a.
SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#no shutdown

b.
SWITCH>enable
SWITCH#configure terminal
SWITCH(config)#interface f0/2
SWITCH(config-if)#no shutdown

c.
SWITCH>enable
SWITCH#config term
SWITCH(config)#interface range f0/4-8
SWITCH(config-if-range)#shutdown

d.
SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#shutdown
Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
File system that has a features like permissions, encryption, quotas, and auditing services.
New Technology File System
Answer: 

Question 13
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Two Categories of a Group Policy. Choose any that apply.
Select one or more:
a.
Security settings

b.
Computer settings

c.
User settings

d.
Account settings
Feedback
Your answer is correct.

Question 14
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
It is a core feature of Windows that allow the network administrator to enable and disable
different features in Windows
Group Policies
Answer: 

Question 15
Correct
Mark 1.00 out of 1.00

Flag question
Question text
It is a standard configuration that is approved by any company for a specific type of system or
device for being secure
Select one:
a.
Security

b.
Configuration Baseline

c.
Security baseline

d.
File System
Feedback
Your answer is correct.

MIDTERM QUIZ 2
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is the idea of developing a database system to store and retrieve large volumes of data
NoSQL database
Answer: 

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is an advanced method of handling an error.
Exception handling
Answer: 

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
These are logon information from all the websites you visit and is stored in memory on
computer
Cookies
Answer: 

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Large volume of data is also known as
Big Data
Answer: 

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is another term for a runtime error
Exception
Answer: 
Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
very single application must go through the options and check whether each application is
configured in the most secure state.

Select one:
True 
False

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a security concern because most scripting languages can make some alteration to your
system.

Select one:
a.
Java

b.
Scripting

c.
Cookies

d.
Cross-site scripting
Feedback
Your answer is correct.
Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
To avoid and prevent this type of attack, users should always choose the “Remember Me”
option when logging in to any web site.

Select one:
True
False 

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The following codes is an example of?
Try
MessageBox.Show(cdbl(txtTotalValue.text) + cdbl(txtTotalVAT.text))
Catch ex as InvalidCastException
MessageBox.Show("Please supply 2 numbers as input")
Catch ex as Exception
MessageBox.Show("An error has occurred. Please try again.")
End Try

Select one:
a.
Exception handling

b.
try/catch block

c.
block syntax

d.
handling errors
Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Always disable unnecessary features of the web server that are not going to be used

Select one:
True 
False

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It can manipulate your system including the deletion of the important files on your
computer.
ActiveX controls
Answer: 

Question 12
Correct
Mark 1.00 out of 1.00
Flag question

Question text
SMTP and FTP are used to transfer information over a computer network.

Select one:
True 
False

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It is a restricted area with a resource that these Java applications can access.

Select one:
a.
ActiveX controls

b.
Scripting

c.
Java

d.
Sandbox
Feedback
Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00
Flag question

Question text
It is a special system used in industrial environments and settings to monitor their
operations

Select one:
a.
Mainframe

b.
Embedded

c.
SCADA

d.
Android
Feedback
Your answer is correct.

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Developers should always implement validation at both the client and the server to obtain
high level of security.

Select one:
True 
False

FINAL QUIZ 1
Question 1
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Why is RADIUS or TACACS+ needed? Why can’t the end user authenticate directly to the
authentication server?

Select one:
a.
The added level of complexity helps Cisco and other vendors to sell more products.

b.
Both RADIUS and TACACS+ extend the Layer-2 authentication protocols, allowing the end
user to communicate with an authentication server that is not Layer-2 adjacent

c.
Because the names sound so cool.

d.
RADIUS and TACACS+ are used between the end user and the authentication server.
Feedback
Your answer is correct.

Question 2
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which of the following protocols is best suited for authenticating and authorizing a user for
network access AAA?

Select one:
a.
RADIUS
b.
CHAP

c.
TACACS+

d.
MS-CHAPv2
Feedback
Your answer is correct.

Question 3
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which of the following is true?

Select one:
a.
The EAP communication occurs between the supplicant and theauthentication server.

b.
The supplicant uses RADIUS to communicate the user’s identity to the authentication server.

c.
The authenticator uses EAP to send the user’s credentials to the authentication server.

d.
The authenticator decides whether the supplicant is allowed on the network.
Feedback
Your answer is correct.

Question 4
Correct
Mark 5.00 out of 5.00
Flag question

Question text
Which of the following are TACACS+ messages sent from the AAA client to the AAA server?
(Select all that apply.)

Select one or more:


a.
REPLY

b.
START

c.
CHALLENGE

d.
REQUEST
Feedback
Your answer is correct.

Question 5
Correct
Mark 5.00 out of 5.00

Flag question

Question text
What is the purpose of an outer identity?

Select one:
a.
The outer identity represents the machine, whereas the inner identity represents the user
during EAP chaining.

b.
The outer identity provides a mechanism to modify the actual identity of the end user or
device to allow for identity spoofing.

c.
The outer identity is used for dual-factor authentications such as a username/password
combined with a one-time password (OTP).

d.
The outer identity provides a mechanism to authenticate the identity of the endpoint during
the tunnel establishment phase.
Feedback
Your answer is correct.

Question 6
Correct
Mark 5.00 out of 5.00

Flag question

Question text
When using RADIUS, what tells the AAA server which type of action is being authenticated?

Select one:
a.
RADIUS does not distinguish between different services.

b.
The Service-Type field.

c.
The TACACS+ service.

d.
The action AV-pair.
Feedback
Your answer is correct.

Question 7
Correct
Mark 5.00 out of 5.00
Flag question

Question text
True or False? RADIUS can be used for device administration AAA.

Select one:
a.
True

b.
False
Feedback
Your answer is correct.

Question 8
Correct
Mark 5.00 out of 5.00

Flag question

Question text
True or False? A tunneled EAP type is able to use native EAP types as its inner method.

Select one:
a.
True

b.
False
Feedback
Your answer is correct.

Question 9
Correct
Mark 5.00 out of 5.00
Flag question

Question text
Which of the following protocols is best suited for granular command level control with
device administration AAA?

Select one:
a.
RADIUS+

b.
TACACS+

c.
DIAMETER

d.
RADIUS
Feedback
Your answer is correct.

Question 10
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which of the following best describes an AV-pair?

Select one:
a.
Cisco likes to throw in terms to confuse the reader.

b.
When communicating with an AAA protocol, the AV-pair stipulates a common attribute or
object and its assigned value.
c.
The AV-pair is used to specify the quality of service (QoS) for audio and video traffic.

d.
The AV-pair is used to choose either TACACS+ or RADIUS.
Feedback
Your answer is correct.

Question 11
Correct
Mark 5.00 out of 5.00

Flag question

Question text
True or False? The supplicant is required to trust the certificate of the authentication server
before it will form the TLS tunnel within which the EAP transaction will occur.

Select one:
a.
True

b.
False
Feedback
Your answer is correct.

Question 12
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which of the following best describes the difference between authentication and
authorization?

Select one:
a.
Authorization determines what a user may do, whereas an authentication determines what
devices the user can interact with.

b.
Authentication validates the user’s identity, whereas authorization determines what that
user is permitted to do.

c.
Authentication is used with both network access and device administration, whereas
authorization applies only to device administration.

d.
There is no difference between authentication and authorization.
Feedback
Your answer is correct.

Question 13
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which of the following Cisco products should be used for device administration with
TACACS+?

Select one:
a.
Cisco Centri

b.
Cisco Secure Access Control Server (ACS)

c.
Cisco Identity Services Engine

d.
Cisco TACACS+ Control Server (TCS)
Feedback
Your answer is correct.

Question 14
Correct
Mark 5.00 out of 5.00

Flag question

Question text
What is the name of the “secure cookie” used with EAP-FAST that can be used in lieu of a
certificate, or even in addition to a certificate?

Select one:
a.
Private authorization credential (PAC)

b.
Protected access credential (PAC)

c.
Protected password file (PPF)

d.
Shadow credential file (SCF)
Feedback
Your answer is correct.

Question 15
Correct
Mark 5.00 out of 5.00

Flag question

Question text
True or False? IEEE 802.1X may use TACACS+ to communicate the EAP identity to the
authentication server.

Select one:
a.
True

b.
False
Feedback
Your answer is correct.

Question 16
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which of the following are types of AAA as related to the topics of this exam?

Select one or more:


a.
Network access

b.
Network administration

c.
A division of minor league baseball

d.
Device access

e.
Device administration
Feedback
Your answer is correct.

Question 17
Correct
Mark 5.00 out of 5.00
Flag question

Question text
True or False? MSCHAPv2 may be used to perform machine authentication with an LDAP
connection to Active Directory.

Select one:
a.
False

b.
True
Feedback
Your answer is correct.

Question 18
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which supplicant(s) is capable of EAP chaining?

Select one:
a.
Odyssey Client

b.
Cisco AnyConnect NAM

c.
Windows Native Supplicant

d.
Cisco Secure Services Client (CSSC)
Feedback
Your answer is correct.

Question 19
Correct
Mark 5.00 out of 5.00

Flag question

Question text
True or False? A machine authentication may use EAP-FAST.

Select one:
a.
False

b.
True
Feedback
Your answer is correct.

Question 20
Correct
Mark 5.00 out of 5.00

Flag question

Question text
What are the three main components of IEEE 802.1X?

Select one:
a.
Authentication server, supplicant, authenticator

b.
Supplicant, authorizer, authorization server

c.
EAP, RADIUS, TLS
d.
Agent, broker, authentication server
Feedback
Your answer is correct.

FINAL QUIZ 2
Question 1
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which command on a Cisco switch will display the current status of the AAA server(s)?

Select one:
a.
show aaa servers

b.
show authentication servers

c.
show ise servers

d.
show radius servers
Feedback
Your answer is correct.

Question 2
Correct
Mark 5.00 out of 5.00

Flag question
Question text
True or False? Cisco switches should be configured in production to send syslog messages
to the ISE MNT node.

Select one:
a.
False

b.
True
Feedback
Your answer is correct.

Question 3
Correct
Mark 5.00 out of 5.00

Flag question

Question text
What is the purpose of adding a user with the username radiustest password password
command?

Select one:
a.
The username and password are used for the supplicant’s outer identity to authenticate
against the switch local user database.

b.
The switch can send periodic RADIUS Access-Requests to the AAA servers to verify whether
they are still alive. The username and password will be used for that test.

c.
Without the local username and password in the configuration, an administrator can be
locked out of the switch when the RADIUS server is unavailable.

d.
The username and password are used for the local RADIUS server available in the switch,
which is used in WAN down scenarios.
Feedback
Your answer is correct.

Question 4
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which interface-level command is the equivalent of “turn authentication on”?

Select one:
a.
dot1x system-auth-control

b.
aaa server radius dynamic-author

c.
authentication port-control auto

d.
ip device-tracking
Feedback
Your answer is correct.

Question 5
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which of the following technologies enables an administrator to maintain the same
configuration on all access ports, on all switches, regardless of the type of device connecting
to the network?

Select one:
a.
Flex-Auth

b.
Flex-Connect

c.
AnyConnect

d.
Multi-Auth
Feedback
Your answer is correct.

Question 6
Correct
Mark 5.00 out of 5.00

Flag question

Question text
When configuring a Cisco switch for 802.1X, at which level of the configuration do the
802.1X-related commands exist?

Select one:
a.
Enabling 802.1X changes the context to a dot1x subconfiguration mode, where all related
commands are entered.

b.
Both at global configuration level as well as per interface.

c.
Global configuration only.

d.
Interface configuration only.
Feedback
Your answer is correct.

Question 7
Correct
Mark 5.00 out of 5.00
Flag question

Question text
Which command will validate that authentications are being attempted, which
authentications are successful, and which authorization results have been assigned?

Select one:
a.
show aaa servers

b.
show authentication statistics

c.
show authentication method dot1x

d.
show authentication session interface <interface>
Feedback
Your answer is correct.

Question 8
Correct
Mark 5.00 out of 5.00

Flag question

Question text
True or False? 802.1X can be configured on all switch interfaces, including Layer-3 interfaces.

Select one:
a.
True

b.
False
Feedback
Your answer is correct.

Question 9
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Which host mode will permit a virtually unlimited number of endpoints per port, allowing all
subsequent MAC addresses to share the authorization result of the first endpoint
authorized?

Select one:
a.
Multi-Auth

b.
MDA

c.
Single Mode

d.
Multi-Host
Feedback
Your answer is correct.

Question 10
Correct
Mark 5.00 out of 5.00

Flag question

Question text
When configuring a Cisco Wireless LAN Controller (WLC) for communication with ISE, what
must be configured for the wireless LAN (WLAN)? (Choose two.)

Select one:
a.
The authentication and authorization RADIUS servers can be pointed to the same ISE PSN.

b.
The authentication and authorization RADIUS servers can be pointed to different ISE PSNs,
as long as those PSNs are part of a node group.

c.
The WLAN must be configured for SNMP NAC.

d.
The WLAN must be configured for RADIUS NAC.
Feedback
Your answer is correct.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy