[WpProQuiz 9]
Author: adminccna
[WpProQuiz 8]
[WpProQuiz 7]
[WpProQuiz 6]
[WpProQuiz 5]
[WpProQuiz 4]
[WpProQuiz 3]
[WpProQuiz 2]
[WpProQuiz 1]
CCNA Security Final Exam Answers 1. Which security implementation will provide control plane protection for a network device? encryption for remote access connections AAA for authenticating management access routing protocol authentication* NTP for consistent timestamps on logging messages 2. What is the one major difference between local AAA authentication and using the login local command when configuring device access authentication? Local AAA authentication provides a way to configure backup methods of authentication, but login local does not.* The login local command requires the administrator to manually configure the usernames and passwords, but local AAA authentication does not. Local AAA authentication…
CCNA Security Practice Final Exam Answers What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN? authenticates the IPsec peers guarantees message integrity* protects IPsec keys during session negotiation creates a secure channel for key negotiation What ports can receive forwarded traffic from an isolated port that is part of a PVLAN? other isolated ports and community ports only promiscuous ports* all other ports within the same community only isolated ports What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete? negotiation of the…
CCNA Security Chapter 11 Exam Answers What is the purpose of a security awareness campaign? to teach skills so employees can perform security tasks to focus the attention of employees on security issues* to provide users with a training curriculum that can ultimately lead to a formal degree to integrate all the security skills and competencies into a single body of knowledge What is the goal of network penetration testing? detecting configuration changes on network systems detecting potential weaknesses in systems determining the feasibility and the potential consequences of a successful attack* detecting weak passwords Which security program is aimed…