Vous êtes sur la page 1sur 10

Answer CCNA Security Chapter 6 Test CCNAS v1.

1 | Invisible Algorithm

Home

Category

Search

Sitemap

Contact Us

About

VMware Courses-Free Exams


VMware and Zimbra training courses Register today and become a VCP
www.alfavad.com

Answer CCNA Security Chapter 6 Test CCNAS v1.1


Posted on August 4, 2012

RECENTLY WRI TTEN

Disable w3 Total Cache Plugin Completely Unable to Connect to Internet Eset Smart Security Atheros AR5007EG Windows 7 Driver Network Security Chapter 4 Packet Tracer Activity A Answer Answer CCNA Security Chapter 10 Test CCNAS v1.1

FirePlotter
A real-time bandwidth monitor for Cisco and FortiNet firewalls
www.fireplotter.com

AGT International
A Global Provider of Advanced Safety and Security Solutions
www.agtinternational.com

X.25 Network Conversion


Best Value for X.25-TCP/IP Gateways Supports XOT, SVC, PVC, SNMP & LAPB
www.microtronix.com COFFEE FOR ME

Free CNA Exam Questions


Exam Questions Practice Flash Cards Medical Assistant Vocabulary Cards
www.cnatutor.org SEARCH

This post is about answer for CCNA Security Chapter 6 Test. The questions displayed in this post are based on CCNAS v1.1. All the answers has been confirmed to be 100% correct. With this

Search

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

solution, hopefully it will be a good reference for all of us.


Login

As a recommended practice for Layer 2 security, how should VLAN 1 be treated? All access ports should be assigned to VLAN 1. All trunk ports should be assigned to VLAN 1. VLAN 1 should be used for management traffic. VLAN 1 should not be used.

Invisible Algorithm
on Facebook Like

105 people like


Facebook social plugin

Follow

+6
With IP voice systems on data networks, which two types of attacks target VoIP specifically? (Choose two.) CoWPAtty Kismet SPIT virus vishing
Find us on Google+

Which option best describes a MAC address spoofing attack? An attacker gains access to another host and masquerades as the rightful user of that device. An attacker alters the MAC address of his host to match another known MAC address of a target host. An attacker alters the MAC address of the switch to gain access to the network device from a rogue host device. An attacker floods the MAC address table of a switch so that the switch can no longer filter network access based on MAC
CCNA SECURI TY

Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

addresses.

Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Final Exam

Which

attack

relies

on

the

default

automatic trunking

configuration on most Cisco switches? LAN storm attack VLAN hopping attack STP manipulation attack MAC address spoofing attack

Which two measures are recommended to mitigate VLAN hopping attacks? (Choose two.) Use a dedicated native VLAN for all trunk ports. Place all unused ports in a separate guest VLAN. Disable trunk negotiation on all ports connecting to

workstations. Enable DTP on all trunk ports. Ensure that the native VLAN is used for management traffic.

Which three are SAN transport technologies? (Choose three.) Fibre Channel SATA iSCSI IP PBX FCIP

RANDOM TERMS

matlab code for filtering mask pt activity 8 6 1 ccna skills integration challenge instructor ccna security chapter 3 v1 1 mysql port ndern xampp t is an accurate description of CHAP when used with PPP on a serial

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

IDE

connection between two routers?

Refer to the exhibit. What action will the switch take when the maximum number of secure MAC addresses has reached the allowed limit on the Fa0/2 port? Packets with unknown source addresses are dropped, but

notification of the dropped packets is sent. The VLAN that Fa0/2 is on is set to error-disabled and all traffic on the VLAN is stopped. The interface immediately becomes error-disabled and the port LED is turned off. Packets with unknown source addresses are dropped without notification.

Which software tool can a hacker use to flood the MAC address table of a switch? macof Cisco CCP kiwi syslog server protocol analyzer

Which two methods are used to mitigate VLAN attacks? (Choose two.) enabling port security on all trunk ports

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

using a dummy VLAN for the native VLAN implementing BPDU guard on all access ports disabling DTP autonegotiation on all trunk ports using ISL instead of 802.1q encapsulation on all trunk interfaces

Which three switch security commands are required to enable port security on a port so that it will dynamically learn a single MAC address and disable the port if a host with any other MAC address is connected? (Choose three.) switchport mode access switchport mode trunk switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security mac-address mac-address

What is an example of a trusted path in an operating system? digital certificate digital signature hash message authentication Ctrl-Alt-Delete key sequence

Why are traditional network security perimeters not suitable for the latest consumer-based network endpoint devices? These devices are not managed by the corporate IT department.

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

These devices are more varied in type and are portable. These devices connect to the corporate network through public wireless networks. These devices pose no risk to security as they are not directly connected to the corporate network.

Which Cisco IronPort appliance would an organization install to manage and monitor security policy settings and audit information? C-Series M-Series S-Series SenderBase-Series

Which Cisco IronPort appliance would an organization install to protect against malware? C-Series M-Series S-Series SenderBase-Series

What is the goal of the Cisco NAC framework and the Cisco NAC appliance? to ensure that only hosts that are authenticated and have had their security posture examined and approved are permitted onto the network to monitor data from the company to the ISP in order to build a

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

real-time database of current spam threats from both internal and external sources to provide anti-malware scanning at the network perimeter for both authenticated and non-authenticated devices to provide protection against a wide variety of web-based threats, including adware, phishing attacks, Trojan horses, and worms

When the Cisco NAC appliance evaluates an incoming connection from a remote device against the defined network policies, what feature is being used? authentication and authorization posture assessment quarantining of noncompliant systems remediation of noncompliant systems

Which command is used to configure the PVLAN Edge feature? switchport block switchport nonnegotiate switchport protected switchport port-security violation protect

Which statement is true about a characteristic of the PVLAN Edge feature on a Cisco switch? All data traffic that passes between protected ports must be forwarded through a Layer 2 device. All data traffic that passes between protected ports must be forwarded through a Layer 3 device.

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

Only broadcast traffic is forwarded between protected ports. Only unicast traffic is forwarded between protected ports.

What is the default configuration of the PVLAN Edge feature on a Cisco switch? All active ports are defined as protected. All ports are defined as protected. No ports are defined as protected. EtherChannel groups are defined as protected ports.

Under which circumstance is it safe to connect to an open wireless network? The connection utilizes the 802.11n standard. The device has been updated with the latest virus protection software. The connection is followed by a VPN connection to a trusted network. The user does not plan on accessing the corporate network when attached to the open wireless network.

As stated earlier, all this answers has been verified to be 100% correct. If you found any wrong answers provided, please leave comment below. We do appreciate all the corrections that you made. If you want to contribute for new question or any latest version of chapter test and exam question, please let me know. We do appreciate it too. Credit: The answer in this chapter test has been provided by Xase. All credit goes to him.

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

Vpn Connection

Hosts

Water Filter

This entry was posted in Data Network, Network Security and tagged 2012, Answer, CCNA Security, CCNA Security Chapter 6 Answer, CCNA Security Chapter 6 Test, CCNAS Chapter 6 Test, CCNAS v1.1, Chapter 6 Test, Solution, Solution CCNA Security Chapter 6 by InviAlgo. Bookmark the permalink.

ONE THOUGHT ON ANSWER CCNA SECURITY CHAPTER 6 TEST CCNAS V1.1

emanuel on August 4, 2012 at 11:19 PM said:

Millones de gracias!. Me has salvado de un gran aprieto. La mejor pagina de TODAS!.


Reply

Leave a Reply
Your email address will not be published. Required fields are marked *

Name

Email

Website

Comment

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Answer CCNA Security Chapter 6 Test CCNAS v1.1 | Invisible Algorithm

All All

Post Comment

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Search Invisible Algorithm: ccna security chapter 6 exam answers, ccna security chapter 6 answers, as a recommended practice for layer 2 security how should vlan 1 be treated?, pt activity layer 2 security answer, why are traditional network security perimeters not suitable for the latest consumer-based network endpoint devices?, Which command is used to configure the PVLAN Edge feature?, ccnas chapter 6, Under which circumstance is it safe to connect to an open wireless network?, Which Cisco IronPort appliance would an organization install to protect against malware?, what is an example of a trusted path in an operating system?

http://www.invialgo.com/2012/answer-ccna-security-chapter-6-test-ccnas-v1-1/[11/1/2012 1:19:18 AM]

Vous aimerez peut-être aussi