Category: CCNA Security v2.0 Answers
CCNA Security v2.0 Answers 2015 2016 PDF Download
1. In addition to the criteria used by extended ACLs, what conditions are used by a classic firewall to filter traffic? TCP/UDP source and destination port numbers TCP/IP protocol numbers IP source and destination addresses application layer protocol session information 2. A router has been configured as a …
1. A user complains about not being able to gain access to a network device configured with AAA. How would the network administrator determine if login access for the user account is disabled? Use the show aaa local user lockout command.* Use the show running-configuration command. Use the …
1. Which two characteristics apply to role-based CLI access superviews? (Choose two.) A specific superview cannot have commands added to it directly.* CLI views have passwords, but superviews do not have passwords. A single superview can be shared among multiple CLI views. Deleting a superview deletes all associated …
1. What method can be used to mitigate ping sweeps? using encrypted or hashed authentication protocols installing antivirus software on hosts deploying antisniffer software on all network devices blocking ICMP echo and echo-replies at the network edge* 2. What are the three major components of a worm attack? …