Chapter Outline: 6.0 Introduction 6.1 Endpoint Security 6.2 Layer 2 Security Threats 6.3 Summary Section 6.1: Endpoint Security Upon completion of this section, you should be…
Chapter Outline: 5.0 Introduction 5.1 IPS Technologies 5.2 IPS Signatures 5.3 Implement IPS 5.4 Summary Section 5.1: IPS Technologies Upon completion of this section, you should…
Chapter Outline: 4.0 Introduction 4.1 Access Control Lists 4.2 Firewall Technologies 4.3 Zone-Based Policy Firewalls 4.4 Summary Section 4.1: Access Control List Upon completion of this…
Chapter Outline: 3.0 Introduction 3.1 Purpose of the AAA 3.2 Local AAA Authentication 3.3 Server-Based AAA 3.4 Server-Based AAA Authentication 3.5 Server-Based Authorization and Accounting 3.6…
Chapter Outline: 2.0 Introduction 2.1 Securing Device Access 2.2 Assigning Administrative Roles 2.3 Monitoring and Managing Devices 2.4 Using Automated Security Features 2.5 Securing the Control…
Chapter Outline: 1.0 Introduction 1.1 Securing Networks 1.2 Network Threats 1.3 Mitigating Threats 1.4 Summary Section 1.1: Securing Networks Upon completion of this section, you should…
CCNA Security Final Exam Answers 1. Which security implementation will provide control plane protection for a network device? encryption for remote access connections AAA for authenticating…
CCNA Security Practice Final Exam Answers What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN? authenticates the…
CCNA Security Chapter 11 Exam Answers What is the purpose of a security awareness campaign? to teach skills so employees can perform security tasks to focus…
CCNA Security Chapter 10 Exam Answers Which minimum configuration is required on most ASAs before ASDM can be used? SSH a dedicated Layer 3 management interface*…
CCNA Security Chapter 9 Exam Answers What are two factory default configurations on an ASA 5505? (Choose two.) VLAN 2 is configured with the name inside.…
CCNA Security Chapter 8 Exam Answers Which three statements describe the IPsec protocol framework? (Choose three.) AH provides integrity and authentication.* ESP provides encryption, authentication, and…