Time limit: 0
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
In a spoofing attack, which of the following parameters are commonly spoofed? (Choose two answers)
CorrectIncorrect -
Question 2 of 15
2. Question
Which of the following attacks typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to additional users?
CorrectIncorrect -
Question 3 of 15
3. Question
In a reflection attack, the source IP address in the attack packets is spoofed so that it contains the address of the victim.
CorrectIncorrect -
Question 4 of 15
4. Question
What can be accomplished with a brute-force attack?
CorrectIncorrect -
Question 5 of 15
5. Question
A ____________ is malicious software that is hidden and packaged inside other software that looks normal and legitimate.
CorrectIncorrect -
Question 6 of 15
6. Question
Match the type of human security vulnerabilities attacks with the respective intentions.
Sort elements
- Social engineering
- Phishing
- Whaling
- Pharming
-
Exploits human trust and social behavior
-
Is the attempt to obtain sensitive information such as passwords and credit card details by disguising oneself as a trustworthy entity
-
Is a type of attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company
-
Uses legitimate services to send users to a compromised site
CorrectIncorrect -
Question 7 of 15
7. Question
Answer the fill-in-the-blank by typing the correct protocol:
-
AAA servers usually support the protocol TACACS+ and to communicate with enterprise resources.
CorrectIncorrect -
-
Question 8 of 15
8. Question
A next-generation firewall sits at the edge of a company’s connection to the Internet. A network engineer has been configured to prevent Telnet clients residing on the Internet from accessing Telnet servers inside the company. Which of the following might a next-generation firewall use that a traditional firewall would not?
CorrectIncorrect -
Question 9 of 15
9. Question
Match Cisco Firepower NGIPS’s features with the respective benefits.
Sort elements
- Superior effectiveness
- Contextual awareness
- Advanced threat protection and rapid remediation
- Granular application visibility and control
-
Stop more threats, both known and unknown, with industry-leading threat protection. Speeds time to detection of malware to reduce its damage and spread
-
With real-time visibility, gain more insight into and control over the users, applications, devices, threats, and vulnerabilities in your network
-
Rapidly detect, block, contain and remediate advanced threats through tightly integrated AMP and sandboxing solutions. Patch vulnerabilities “virtually” and instantaneously before new software or signatures become available
-
Reduce threats to your network through precise control over more than 4000 commercial applications, with support for custom applications
CorrectIncorrect -
Question 10 of 15
10. Question
Type the command that needs to be configured on a switch to automatically recover from the err-disabled state, when caused by port security.
-
SW-examsD(config)#
CorrectIncorrect -
-
Question 11 of 15
11. Question
The senior network engineer assigns you a task related to port security. He needs your help to configure the fa0/1 from the SW-examsD to accept frames only from the MAC 0200.1111.2222.
Type the commands that need to be configured on the SW-examsD following the requirements below:
1) configure the FastEthernet0/1 to be an access port
2) enable port security on that interface
3) define the allowed MAC address
-
!start configuration
SW-examsD#
Enter configuration commands, one per line. End with CNTL/Z.SW-examsD(config)#
SW-examsD(config-if)#
SW-examsD(config-if)#
SW-examsD(config-if)#
CorrectIncorrect -
-
Question 12 of 15
12. Question
Your PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual four DHCP messages that flow between the PC (DHCP client) and the DHCP server, which ones do the server send? (Choose two answers)
CorrectIncorrect -
Question 13 of 15
13. Question
What devices can be used to implement DHCP Snooping? (Choose two answers)
CorrectIncorrect -
Question 14 of 15
14. Question
You are responsible to enable DHCP snooping on the SW1. The R1 is a DHCP relay agent that needs to be trusted. SW1 places all the ports on VLAN 8.
Type the commands in order to configure DHCP snooping on the SW1 based on the diagram below.
-
!start configuration
SW1#SW1(config)#
SW1(config)#
SW1(config)#
SW1(config-if)#
CorrectIncorrect -
-
Question 15 of 15
15. Question
Which of the following options is a security feature that rejects invalid and malicious ARP packets and prevents a class of man-in-the-middle attacks?
CorrectIncorrect