Time limit: 0
Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
CCNA Cyber Ops (Version 1.1) – Chapter 5 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
1 pointsWhat are two types of addresses found on network end devices? (Choose two.)Correct
Incorrect
-
Question 2 of 25
2. Question
1 pointsWhich OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments?Correct
Incorrect
-
Question 3 of 25
3. Question
1 pointsWhich protocol provides authentication, integrity, and confidentiality services and is a type of VPN?Correct
Incorrect
-
Question 4 of 25
4. Question
1 pointsWhat are two uses of an access control list? (Choose two.)Correct
Incorrect
-
Question 5 of 25
5. Question
1 pointsWhich protocol or service is used to automatically synchronize the software clocks on Cisco routers?Correct
Incorrect
-
Question 6 of 25
6. Question
1 pointsWhich wireless parameter is used by an access point to broadcast frames that include the SSID?Correct
Incorrect
-
Question 7 of 25
7. Question
1 pointsA Cisco router is running IOS 15. What are the two routing table entry types that will be added when a network administrator brings an interface up and assigns an IP address to the interface? (Choose two.)Correct
Incorrect
-
Question 8 of 25
8. Question
1 pointsRefer to the exhibit. The network “A” contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as “A”?Correct
Incorrect
-
Question 9 of 25
9. Question
1 pointsWhat is the role of an IPS?Correct
Incorrect
-
Question 10 of 25
10. Question
1 pointsWhich two features are included by both TACACS+ and RADIUS protocols? (Choose two.)Correct
Incorrect
-
Question 11 of 25
11. Question
1 pointsWhat does the TACACS+ protocol provide in a AAA deployment?Correct
Incorrect
-
Question 12 of 25
12. Question
1 pointsWhich parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?Correct
Incorrect
-
Question 13 of 25
13. Question
1 pointsWhat information within a data packet does a router use to make forwarding decisions?Correct
Incorrect
-
Question 14 of 25
14. Question
1 pointsWhich protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?Correct
Incorrect
-
Question 15 of 25
15. Question
1 pointsWhich two statements are true about NTP servers in an enterprise network? (Choose two.)Correct
Incorrect
-
Question 16 of 25
16. Question
1 pointsWhat is true concerning physical and logical topologies?Correct
Incorrect
-
Question 17 of 25
17. Question
1 pointsWhich layer of the hierarchical design model is a control boundary between the other layers?Correct
Incorrect
-
Question 18 of 25
18. Question
1 pointsWhich protocol or service allows network administrators to receive system messages that are provided by network devices?Correct
Incorrect
-
Question 19 of 25
19. Question
1 pointsWhat is a function of a proxy firewall?Correct
Incorrect
-
Question 20 of 25
20. Question
1 pointsWhat is the function of the distribution layer of the three-layer network design model?Correct
Incorrect
-
Question 21 of 25
21. Question
1 pointsWhich LAN topology requires a central intermediate device to connect end devices?Correct
Incorrect
-
Question 22 of 25
22. Question
1 pointsWhich device can control and manage a large number of corporate APs?Correct
Incorrect
-
Question 23 of 25
23. Question
1 pointsFor which discovery mode will an AP generate the most traffic on a WLAN?Correct
Incorrect
-
Question 24 of 25
24. Question
1 pointsWhat is a feature of the TACACS+ protocol?Correct
Incorrect
-
Question 25 of 25
25. Question
1 pointsWhat is the only attribute used by standard access control lists to identify traffic?Correct
Incorrect