Category: CCNA v7.0
1. How many total ACLs (both IPv4 and IPv6) can be configured on an interface? 0 1 2 4 8 2. Which of the following is an ACL best practice? Always test ACLs on a production network. Create your ACLs on a production router. Document the ACLs using …
4.2.5 Check Your Understanding – Wildcard Masks in ACLs Answers
1. Which wildcard mask would permit only host 10.10.10.1? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 2. Which wildcard mask would permit only hosts from the 10.10.0.0/16 network? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 3. Which wildcard mask would permit all hosts? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 4. Which wildcard mask …
4.1.5 Check Your Understanding – Purpose of ACLs Answers
1. What are the permit or deny statements in an ACL called? access control entries arbitrary statements content control entries control statements 2. Which packet filtering statement is true? Extended ACLs filter at Layer 3 only. Extended ACLs filter at Layer 4 only. Standard ACLs filter at Layer …
3.10.10 Check Your Understanding – Cryptography Answers
1. Which encryption method repeats an algorithm process three times and is considered very trustworthy when implemented using very short key lifetimes? Rivest Cipher Triple DES Block Cipher Data Encryption Standard Stream Cipher 2. Which encryption method encrypts plaintext one byte or one bit at a time? Rivest …
3.9.6 Check Your Understanding – Network Security Best Practices Answers
1. Which network security device ensures that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts? VPN ASA Firewall IPS ESA/WSA AAA Server 2. Which network security device contains a secure database of who is authorized to access and manage …
3.7.6 Check Your Understanding – TCP and UDP Vulnerabilities Answers
1. Which attack exploits the three-way handshake? TCP reset attack UDP flood attack TCP SYN Flood attack DoS attack TCP session hijacking 2. Two hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both …
3.6.7 Check Your Understanding – IP Vulnerabilities and Threats Answers
1. Which attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication? Address Spoofing Attack Amplification and Reflection Attacks ICMP Attack MiTM Attack Session Hijacking 2. Which attack is being used when threat actors gain access …
3.5.10 Check Your Understanding – Common Network Attacks Answers
1. What type of attack is tailgating? Reconnaissance Access DoS Social Engineering 2. What type of attack is a password attack? Reconnaissance Access DoS Social Engineering 3. What type of attack is port scanning? Reconnaissance Access DoS Social Engineering 4. What type of attack is man-in-the-middle? Reconnaissance Access …
3.4.4 Check Your Understanding – Malware Answers
1. Which malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network. Adware Rootkit Spyware Virus Worm 2. Which malware is non-self-replicating type of malware? …
3.3.5 Check Your Understanding – Threat Actor Tools Answers
1. Which penetration testing tool uses algorithm schemes to encode the data, which then prevents access to the data? Packet Sniffers Encryption Tools Vulnerability Exploitation Tools Forensic Tools Debuggers 2. Which penetration testing tool is used by black hats to reverse engineer binary files when writing exploits? They …