FedVTE Cisco CCNA Security Self Study
FedVTE Cisco CCNA Security self-study notes with key concepts and practice questions on operations security, ACLs, risk analysis, SSH configuration, RADIUS, firewalls, and signature attributes. Ideal for CCNA Security exam prep.
Daniel Miller
Contributor
4.6
44
3 months ago
Preview (2 of 4)
Sign in to access the full document!
FedVTE Cisco CCNA Security Self-Study
Prep Already Passed
Ensuring that several individuals are able t o perform a specific function in order to have
oversight and eliminate single points of failure: is which of the followingOperations Security
principles? y y C. Rotation of duties
A standard ACL yyC. Identifies the source network to be blocked
Which form of risk analysis uses a mathematical model that assigns a monetary figynyB.
Quantitative
Enabling SSH on a router requires all of the following excefttyD. Installing a PuTTY client
The RADI US protocol hides passwords during transmission but the rest of the packet is sent in
plaintext.yyTRUE
Signatures attributes have all the following attributes EXCE t/D. Exceptions
A stateful firewalkyyC. Monitors outbound traffic and permits only reply traffic that properly
matches the outbound traffic
Prep Already Passed
Ensuring that several individuals are able t o perform a specific function in order to have
oversight and eliminate single points of failure: is which of the followingOperations Security
principles? y y C. Rotation of duties
A standard ACL yyC. Identifies the source network to be blocked
Which form of risk analysis uses a mathematical model that assigns a monetary figynyB.
Quantitative
Enabling SSH on a router requires all of the following excefttyD. Installing a PuTTY client
The RADI US protocol hides passwords during transmission but the rest of the packet is sent in
plaintext.yyTRUE
Signatures attributes have all the following attributes EXCE t/D. Exceptions
A stateful firewalkyyC. Monitors outbound traffic and permits only reply traffic that properly
matches the outbound traffic
Ensuring that several individuals are able t o perform a specific function In order to have
oversight and eliminate single points of failure, is which of tlhe followingOperations Security
principles? / / C . Rotation of duties
ACLs have a policy of which of the folIowing?/</A. first match
IOS 12.3 and later, passwordscan b f y C . O t o 16 characters in length
Which VPN listed below DOES NOT encrypt traffK/y D.
All of the following are best practices when configuringrouter login banner messages EXCEPT
y y C. Use the word ’'welcome"
Enabling SSH on a router requires all of the following exce/t/D. Installinga PuTTY client
Granting a user access to a requested service only if the information in the user profile allows it,
is an example of what?yyB. Authorization
Enabling PortFast on a switchpor y B . Disables Spanning Tree on the switchport
Symmetric encryption has all the fol lowing advantages EXCEPT/ A. Simplified key
distribution
oversight and eliminate single points of failure, is which of tlhe followingOperations Security
principles? / / C . Rotation of duties
ACLs have a policy of which of the folIowing?/</A. first match
IOS 12.3 and later, passwordscan b f y C . O t o 16 characters in length
Which VPN listed below DOES NOT encrypt traffK/y D.
All of the following are best practices when configuringrouter login banner messages EXCEPT
y y C. Use the word ’'welcome"
Enabling SSH on a router requires all of the following exce/t/D. Installinga PuTTY client
Granting a user access to a requested service only if the information in the user profile allows it,
is an example of what?yyB. Authorization
Enabling PortFast on a switchpor y B . Disables Spanning Tree on the switchport
Symmetric encryption has all the fol lowing advantages EXCEPT/ A. Simplified key
distribution
Preview Mode
Sign in to access the full document!
100%
Study Now!
XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat