CCNA 4 Exploration v4.0 Chapter 4 Quiz Answers

1. Drag the term on the left to the associated description on the right.

CCNA 4 Exploration v4.0 Chapter 4 Quiz Answers 1

Answer

CCNA 4 Exploration v4.0 Chapter 4 Quiz Answers 2

2. Which two pieces of information can be determined from opening the Cisco SDM homepage of a router? (Choose two.)

  • routing table
  • CDP neighbors
  • snapshot of the router configuration
  • interface status
  • features supported by the Cisco IOS software

3. A technician has been asked to perform a Cisco SDM one-step lockdown test. Which location should be used to initiate the test?

  • diagnostic mode on the Firewall page
  • configure mode on the Security Audit page
  • test mode on the Security Audit page
  • test mode on the Firewall page

4. Drag the term on the left to the associated description on the right.

CCNA 4 Exploration v4.0 Chapter 4 Quiz Answers 3

5. What is a major advantage of HIPS over HIDS?

  • HIPS does not require host-based client software.
  • HIPS consumes fewer system resources.
  • HIPS can prevent intrusions.
  • HIPS prevents the need to update signature files as often.

Explanation: A host-based intrusion detection system (HIDS) typically is implemented as inline or passive technology and sends logs to a management console only after the attack has occurred and the damage is done. A host-based intrusion prevention system (HIPS) typically is implemented inline and actually stops the attack, prevents damage, and blocks the propagation of worms and viruses. Active detection can be set to shut down the network connection or to stop impacted services automatically. Corrective action can be taken immediately. Cisco provides HIPS using the Cisco Security Agent software.

6. What is the core or “hub” component of the Security Wheel?

  • secure
  • monitor
  • improve
  • test
  • security policy

Explanation: The security policy is the hub upon which the four steps of the Security Wheel (secure, monitor, test, and improve) are based. It drives the application of security measures:

  • It identifies the organization’s security objectives.
  • It documents the resources to be protected.
  • It identifies the network infrastructure with current maps and inventories.
  • It identifies the critical resources that need to be protected, such as research and development, finance, and human resources. This is called a risk analysis.

7. As part of a network security plan, where does Cisco recommend that administrators send events captured by syslog?

  • flash
  • NVRAM
  • designated log hosts
  • designated TFTP clients
  • designated SNMP clients

Explanation: A syslog server provides a better solution because all network devices can forward their logs to one central station, where an administrator can review them. Multiple syslog hosts can be configured to provide fault tolerance. An example of a syslog server application is Kiwi Syslog Daemon.

8. Which protocol should be used when strong privacy and session integrity are needed for remote router administration?

  • HTTP
  • SNMP
  • SSH
  • Telnet
  • TFTP

Explanation: Secure Shell (SSH) provides the same functionality and authentication as Telnet but establishes an encrypted connection.

9. Drag the policy on the left to its description on the right. Not all options are used.

CCNA 4 Exploration v4.0 Chapter 4 Quiz Answers 4

10. Drag the three items required to configure SDM from the left to the steps on the right. Not all options are used.

CCNA 4 Exploration v4.0 Chapter 4 Quiz Answers 5

11. Which three services should be disabled on a router to prevent security vulnerabilities? (Choose three.)

  • Network Time Protocol (NTP)
  • Domain Name System (DNS)
  • Secure Socket Layer (SSL)
  • Cisco Express Forwarding (CEF)
  • Simple Network Management Protocol (SNMP)
  • Secure Shell (SSH)

12. Which feature provides a straightforward “one-touch” device lockdown for configuring the security posture of routers?

  • SSH
  • SDM
  • AutoSecure
  • SNMP

13. Drag the description on the left to the correct network management service on the right.

CCNA 4 Exploration v4.0 Chapter 4 Quiz Answers 6

14. Which feature is a web-based device-management tool for Cisco IOS software-based routers?

  • SSH
  • SDM
  • AutoSecure
  • SNMP

15. Which three SDM wizards are available to configure a router? (Choose three.)

  • security audit
  • firewall
  • DHCP
  • QoS
  • routing
  • access list
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x