Which two statements are true about ASA standard ACLs? (Choose two.)
a) They identify only the destination IP address.
b) They are the most common type of ACL.
c) They are applied to interfaces to control traffic.
d) They specify both the source and destination MAC address.
e) They are typically only used for OSPF routes.
Answer:
a) They identify only the destination IP address.
e) They are typically only used for OSPF routes.
Explanation:
ASA standard ACLs match on destination IP (unlike IOS standard ACLs, which match source). They’re mainly used for OSPF.
Cisco Explanation:
ASA standard ACLs are used to identify the destination IP addresses, unlike IOS ACLs where a standard ACL identifies the source host/network. They are typically only used for OSPF routes and can be used in a route map for OSPF redistribution. Standard access lists cannot be applied to interfaces to control traffic.
When dynamic NAT on an ASA is being configured, what two parameters must be specified by network objects? (Choose two.)
a) The inside NAT interface
b) The interface security level
c) The outside NAT interface
d) A range of private addresses that will be translated
e) The pool of public global addresses
Answer:
d) A range of private addresses that will be translated
e) The pool of public global addresses
Explanation:
Dynamic NAT needs an inside local range and a global address pool, both defined via network objects.
Cisco Explanation:
On an ASA, both the pool used as inside global and the internal private addresses to translate are configured through network objects.
Which protocol uses X.509 certificates to support mail protection performed by mail agents?
a) IPsec
b) SSL
c) S/MIME
d) EAP-TLS
Answer:
c) S/MIME
Explanation:
S/MIME uses X.509 certificates for email signing/encryption.
Cisco Explanation:
User email agents use S/MIME to support email protection. S/MIME uses X.509 certificates.
What are two security features commonly found in a WAN design? (Choose two.)
a) WPA2 for data encryption of all data between sites
b) Firewalls protecting the main and remote sites
c) Outside perimeter security including continuous video surveillance
d) Port security on all user-facing ports
e) VPNs used by mobile workers between sites
Answer:
b) Firewalls protecting the main and remote sites
e) VPNs used by mobile workers between sites
Explanation:
Typical WAN security: perimeter firewalls and VPNs for remote/mobile users.
Cisco Explanation:
WANs commonly include firewalls at each site and VPNs used by remote workers between sites.
What is an appropriate use for class 5 digital certificates?
a) Used for online business transactions between companies
b) Used for private organizations or government security
c) Used by organizations for which proof of identity is required
d) Used for testing in situations in which no checks have been performed
Answer:
b) Used for private organizations or government security
Explanation:
Higher class → more trust. Class 5 is the most trusted (gov/private org security).
Cisco Explanation:
Class numbers range 0–5. Class 5 is the most trusted and used for private organizations or governmental security.
Which two statements are characteristics of a virus? (Choose two.)
a) A virus typically requires end-user activation.
b) A virus has an enabling vulnerability, a propagation mechanism, and a payload.
c) A virus replicates itself by independently exploiting vulnerabilities in networks.
d) A virus provides the attacker with sensitive data, such as passwords.
e) A virus can be dormant and then activate at a specific time or date.
Answer:
a) A virus typically requires end-user activation.
e) A virus can be dormant and then activate at a specific time or date.
Explanation:
Viruses need user action (e.g., open file) and can have time-based triggers.
Cisco Explanation:
End-user interaction (opening an app/web page or powering on) typically launches a virus. Once activated, it may infect other files locally or on the LAN.
Match the information security component with the description.
Answer:
Confidentiality — Only authorized individuals, entities or processes can access sensitive information.
Integrity — Data is protected from unauthorized alteration.
Availability — Authorized users must have uninterrupted access to important resources and data.
Explanation:
CIA triad: Confidentiality, Integrity, Availability.
Cisco Explanation:
(As taught) Confidentiality prevents disclosure, integrity prevents unauthorized modification, availability ensures timely access.
Match the security policy with the description. (Not all options are used.)
Answer:
Identifies network applications/uses acceptable to the org — Acceptable Use Policy (AUP)
Identifies how remote users access the network — Remote Access Policy
Specifies who is authorized and identity verification — Identification and Authentication Policy
Specifies OS/app update procedures — Network Maintenance Policy
Explanation:
Each policy governs a specific control domain (use, remote access, identity, maintenance).
Cisco Explanation:
Matches as listed in your prompt.
How does the service password-encryption command enhance password security on Cisco routers and switches?
a) It encrypts passwords as they are sent across the network.
b) It encrypts passwords that are stored in router or switch configuration files.
c) It requires that a user type encrypted passwords for console access.
d) It requires encrypted passwords for Telnet connections.
Answer:
b) It encrypts passwords that are stored in router or switch configuration files.
Explanation:
It obfuscates plaintext passwords in the config (type 7).
Cisco Explanation:
The command encrypts plaintext passwords in the configuration so unauthorized users cannot view them.
Which benefit does SSH offer over Telnet for remotely managing a router?
a) Encryption
b) TCP usage
c) Authorization
d) Connections via multiple VTY lines
Answer:
a) Encryption
Explanation:
SSH encrypts session data; Telnet does not.
Cisco Explanation:
SSH provides secure access, with stronger authentication and encryption for the session.
Refer to the exhibit. Which statement about the JR-Admin account is true?
a) JR-Admin can issue show, ping, and reload commands.
b) JR-Admin can issue ping and reload commands.
c) JR-Admin can issue only ping commands.
d) JR-Admin can issue debug and reload commands.
e) JR-Admin cannot issue any command because the privilege level does not match one of those defined.
Answer:
b) JR-Admin can issue ping and reload commands.
Explanation:
username … privilege 10 permits commands at priv level ≤10 (commonly includes show/ping/reload depending on mapping).
Cisco Explanation:
When username name privilege 10 is issued, access to commands with privilege level 10 or less is permitted.
What protocol is used by SCP for secure transport?
a) IPSec
b) HTTPS
c) SSH
d) Telnet
e) TFTP
Answer:
c) SSH
Explanation:
SCP is built on SSH for secure file copy.
Cisco Explanation:
SCP provides a secure, authenticated method of copying router configs using SSH.
What type of syslog message is displayed with severity level 5?
a) Warning
b) Notification
c) Informational
d) Debugging
Answer:
b) Notification
Explanation:
Syslog level 5 = Notification, 6 = Informational, 7 = Debug.
Cisco Explanation:
The severity level is used to provide an explanation for the event or error that is occurring within the Cisco IOS.
The smaller the number of the severity level, the more critical the event. A Syslog message with a level 5 is considered a notification message.
What command must be issued on a Cisco router that will serve as an authoritative NTP server?
a) ntp master 1
b) ntp server 172.16.0.1
c) ntp broadcast client
d) clock set 11:00:00 DEC 20 2010
Answer:
a) ntp master 1
Explanation:
ntp master makes the router act as an NTP master (stratum given).
Cisco Explanation:
Routers serving as NTP masters use ntp master. Clients use ntp server x.x.x.x.
A server log entry says: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?
a) Authentication
b) Authorization
c) Accounting
d) Accessing
Answer:
c) Accounting
Explanation:
Accounting logs what/when/how long resources are used.
Cisco Explanation:
Accounting records resource usage: what was accessed, duration, and changes.
Which three types of views are available with role-based CLI access? (Choose three.)
a) Superuser view
b) Root view
c) Superview
d) CLI view
e) Admin view
f) Config view
Answer:
b) Root view
c) Superview
d) CLI view
Explanation:
RBAC supports root, CLI view, and superview.
Cisco Explanation:
Three types: root view, CLI view, superview.
Purpose of ip ospf message-digest-key key md5 password and area area-id authentication message-digest?
a) To encrypt OSPF routing updates
b) To enable OSPF MD5 authentication on a per-interface basis
c) To configure OSPF MD5 authentication globally on the router
d) To facilitate neighbor adjacencies
Answer:
c) To configure OSPF MD5 authentication globally on the router
Explanation:
Area-level message-digest enables MD5 auth globally for that area; interface key defines the key.
Cisco Explanation:
Global MD5 auth uses area … authentication message-digest plus ip ospf message-digest-key on interfaces. Auth doesn’t encrypt OSPF.
What does the local-case keyword indicate in local AAA auth?
a) User access is limited to vty lines
b) Passwords and usernames are case-sensitive
c) AAA is enabled globally on the router
d) A default local database AAA auth is applied to all lines
Answer:
b) Passwords and usernames are case-sensitive
Explanation:
local-case forces case-sensitive matching.
Cisco Explanation:
local-case means authentication is case-sensitive; it doesn’t enable/apply AAA by itself
Configuring an AAA server for RADIUS authentication — which two features are included? (Choose two.)
a) Encryption for all communication
b) Hidden passwords during transmission
c) Single process for authentication and authorization
d) Separate processes for authentication and authorization
e) Encryption for only the data
Answer:
b) Hidden passwords during transmission
c) Single process for authentication and authorization
Explanation:
RADIUS encrypts only the password and combines auth+authz.
Cisco Explanation:
RADIUS: combines authentication and authorization; encrypts only the password; uses UDP; supports remote-access/802.1X/SIP.
Where are lt / gt keywords used in ACLs?
a) In an IPv6 extended ACL that stops packets to one destination VLAN
b) In an IPv4 named standard ACL for specific UDP protocols on a server
c) In an IPv6 named ACL that permits FTP traffic from one LAN to another
d) In an IPv4 extended ACL that allows packets from a range of TCP ports destined for a specific device
Answer:
d) In an IPv4 extended ACL that allows packets from a range of TCP ports destined for a specific device
Explanation:
lt / gt specify port comparisons (less-than/greater-than) in extended ACLs.
Cisco Explanation:
Used to define port ranges as less-than or greater-than a particular port.
Which feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?
a) The use of wildcard masks
b) An implicit deny any any statement
c) The use of named ACL statements
d) An implicit permit of neighbor discovery packets
Answer:
d) An implicit permit of neighbor discovery packets
Explanation:
IPv6 ACLs include implicit permits for ND (Neighbor Discovery) traffic so basic IPv6 operations function.
Cisco Explanation:
IPv6 ACLs have two implicit permit statements to allow neighbor discovery operations to function on router interfaces.
Refer to the exhibit. An extended access list has been created to prevent human resource users from gaining access to the accounting server.
All other network traffic is to be permitted.
When following the ACL configuration guidelines, on which router, interface, and direction should the access list be applied?
a) Router R1, interface S0/1/0, outbound
b) Router R2, interface Gi0/0/1, outbound
c) Router R2, interface Gi0/0/1, inbound
d) Router R1, interface Gi0/0/0, inbound
e) Router R2, interface S0/1/1, inbound
f) Router R1, interface Gi0/0/0, outbound
Answer:
d) Router R1, interface Gi0/0/0, inbound
Explanation:
Extended ACLs should be placed close to the source of the traffic being filtered.
Cisco Explanation:
The ACL configuration guidelines recommend placing extended access control lists as close to the source of network traffic as possible and placing standard access control lists as close to the destination of network traffic as possible.
Which statement describes packet-filtering vs stateful firewalls (OSI model)?
a) Both can filter at the application layer.
b) Stateful can filter application layer info; packet-filtering cannot beyond network layer.
c) Packet-filtering filters up to transport layer; stateful filters up to session layer.
d) Packet-filtering uses session layer info; stateful uses application layer info to track state.
Answer:
c) A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer.
Explanation:
Packet filters use L3/L4 fields; stateful devices track connections (session).
Cisco Explanation:
Packet filtering firewalls handle L3 and sometimes L4; stateful firewalls monitor connections up to the session layer.
Which special hardware module, when integrated into ASA, provides advanced IPS features?
a) Content Security and Control (CSC)
b) Advanced Inspection and Prevention (AIP)
c) Advanced Inspection and Prevention Security Services Card (AIP-SSC)
d) Advanced Inspection and Prevention Security Services Module (AIP-SSM)
Answer:
d) Advanced Inspection and Prevention Security Services Module (AIP-SSM)
Explanation:
AIP-SSM (and AIP-SSC) deliver enhanced IPS capabilities on ASA.
Cisco Explanation:
ASA threat services use special modules: AIP (advanced IPS), CSC (antimalware), and AIP-SSM/AIP-SSC for IPS against many known exploits.