Check answers here:
Modules 11 – 12: Network Infrastructure Security Group Exam (Answers)
Quiz-summary
0 of 36 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
Information
Modules 11 - 12: Network Infrastructure Security Group Exam - Test online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 36 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- Answered
- Review
-
Question 1 of 36
1. Question
1 pointsWhat is an advantage of HIPS that is not provided by IDS?Correct
Incorrect
-
Question 2 of 36
2. Question
1 pointsWhich statement describes a difference between RADIUS and TACACS+?Correct
Incorrect
-
Question 3 of 36
3. Question
1 pointsWhat are two disadvantages of using an IDS? (Choose two.)Correct
Incorrect
-
Question 4 of 36
4. Question
1 pointsWhich statement describes one of the rules that govern interface behavior in the context of implementing a zone-based policy firewall configuration?Correct
Incorrect
-
Question 5 of 36
5. Question
1 pointsWhich technique is necessary to ensure a private transfer of data using a VPN?Correct
Incorrect
-
Question 6 of 36
6. Question
1 pointsWhat is the function of the distribution layer of the three-layer network design model?Correct
Incorrect
-
Question 7 of 36
7. Question
1 pointsWhat two components of traditional web security appliances are examples of functions integrated into a Cisco Web Security Appliance? (Choose two.)Correct
Incorrect
-
Question 8 of 36
8. Question
1 pointsWhich AAA component can be established using token cards?Correct
Incorrect
-
Question 9 of 36
9. Question
1 pointsWhich statement describes a VPN?Correct
Incorrect
-
Question 10 of 36
10. Question
1 pointsWhat is a host-based intrusion detection system (HIDS)?Correct
Incorrect
-
Question 11 of 36
11. Question
1 pointsWhich two devices would commonly be found at the access layer of the hierarchical enterprise LAN design model? (Choose two.)Correct
Incorrect
-
Question 12 of 36
12. Question
1 pointsWhich two statements are true about NTP servers in an enterprise network? (Choose two.)Correct
Incorrect
-
Question 13 of 36
13. Question
1 pointsIn the data gathering process, which type of device will listen for traffic, but only gather traffic statistics?Correct
Incorrect
-
Question 14 of 36
14. Question
1 pointsWhich two protocols are link-state routing protocols? (Choose two.)Correct
Incorrect
-
Question 15 of 36
15. Question
1 pointsWhat type of route is created when a network administrator manually configures a route that has an active exit interface?Correct
Incorrect
-
Question 16 of 36
16. Question
1 pointsWhich characteristic describes a wireless client operating in active mode?Correct
Incorrect
-
Question 17 of 36
17. Question
1 pointsWhat are two types of addresses found on network end devices? (Choose two.)Correct
Incorrect
-
Question 18 of 36
18. Question
1 pointsWhat is a characteristic of the WLAN passive discover mode?Correct
Incorrect
-
Question 19 of 36
19. Question
1 pointsWhat is a characteristic of a routed port that is configured on a Cisco switch?Correct
Incorrect
-
Question 20 of 36
20. Question
1 pointsWhat action does an Ethernet switch take when it receives a frame with an unknown Layer 2 source address?Correct
Incorrect
-
Question 21 of 36
21. Question
1 pointsMatch each device to a category.Correct
Incorrect
-
Question 22 of 36
22. Question
1 pointsWhich routing protocol is used to exchange routes between internet service providers?Correct
Incorrect
-
Question 23 of 36
23. Question
1 pointsWhat is the first step in the CSMA/CA process when a wireless client is attempting to communicate on the wireless network?Correct
Incorrect
-
Question 24 of 36
24. Question
1 pointsWhat Wi-Fi management frame is regularly broadcast by APs to announce their presence?Correct
Incorrect
-
Question 25 of 36
25. Question
1 pointsWhat are the three parts of all Layer 2 frames? (Choose three.)Correct
Incorrect
-
Question 26 of 36
26. Question
1 pointsWhat is a function of SNMP?Correct
Incorrect
-
Question 27 of 36
27. Question
1 pointsWhich firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?Correct
Incorrect
-
Question 28 of 36
28. Question
1 pointsIn which memory location is the routing table of a router maintained?Correct
Incorrect
-
Question 29 of 36
29. Question
1 pointsLightweight access points forward data between which two devices on the network? (Choose two.)Correct
Incorrect
-
Question 30 of 36
30. Question
1 pointsA Cisco router is running IOS 15. What are the two routing table entry types that will be added when a network administrator brings an interface up and assigns an IP address to the interface? (Choose two.)Correct
Incorrect
-
Question 31 of 36
31. Question
1 pointsMatch the secunty service with the description.Correct
Incorrect
-
Question 32 of 36
32. Question
1 pointsMatch the network security device type with the descnption.Correct
Incorrect
-
Question 33 of 36
33. Question
1 pointsWhat is used on WLANs to avoid packet collisions?Correct
Incorrect
-
Question 34 of 36
34. Question
1 pointsWhat information within a data packet does a router use to make forwarding decisions?Correct
Incorrect
-
Question 35 of 36
35. Question
1 pointsWhat is a characteristic of a hub?Correct
Incorrect
-
Question 36 of 36
36. Question
1 pointsMatch the network security device type with the description.Correct
Incorrect