1.
What is the best defense for protecting a network from phishing exploits?
Correct Answer
C. Schedule training for all users.
Explanation
Training for all users is the best defense for protecting a network from phishing exploits. Phishing attacks often target individuals by tricking them into providing sensitive information or clicking on malicious links. By providing training to all users, they can learn how to identify and avoid phishing attempts, reducing the risk of falling victim to these attacks. Antivirus scans, antispyware scans, and operating system updates are important for overall network security, but they may not specifically address the human element of phishing attacks.
2.
What are three characteristics of a good security policy? (Choose three.)
Correct Answer(s)
A. It defines acceptable and unacceptable use of network resources.
B. It communicates consensus and defines roles.
E. It defines how to handle security incidents.
Explanation
A good security policy should define the acceptable and unacceptable use of network resources to ensure that users are aware of the rules and guidelines they must follow. It should also communicate consensus and define roles to establish a clear understanding of responsibilities and expectations. Additionally, it should define how to handle security incidents to ensure a proper response and mitigation plan is in place.
3.
The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the file name c2600-d-mz.121-4? (Choose two.)
Correct Answer(s)
C. The software is version 12.1, 4th revision.
E. The IOS is for the Cisco 2600 series hardware platform.
Explanation
The file name "c2600-d-mz.121-4" indicates that the software is version 12.1, 4th revision. Additionally, the "c2600" in the file name suggests that the IOS is for the Cisco 2600 series hardware platform.
4.
Refer to the exhibit. What is accomplished when both commands are configured on
the router?
Correct Answer
C. The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities.
Explanation
The given commands disable the services such as echo, discard, and chargen on the router. These services are known to have security vulnerabilities, so by disabling them, the router is protected from potential attacks or exploits.
5.
Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)
Correct Answer(s)
D. Verify connectivity between the router and TFTP server using the ping command.
E. Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.
Explanation
Before attempting to upgrade a Cisco IOS image using a TFTP server, the network administrator should verify two conditions. Firstly, they should verify the connectivity between the router and TFTP server using the ping command. This ensures that the router can successfully communicate with the TFTP server. Secondly, they should verify that there is enough flash memory for the new Cisco IOS image using the show flash command. This ensures that the router has sufficient storage space to accommodate the new image.
6.
Which two statements regarding preventing network attacks are true? (Choose two.)
Correct Answer(s)
C. pHysical security threat mitigation consists of controlling access to device console ports, labeling critical cable runs, installing UPS systems, and providing climate control.
E. Changing default usernames and passwords and disabling or uninstalling unnecessary services are aspects of device hardening.
7.
An IT director has begun a campaign to remind users to avoid opening e-mail messages from suspicious sources. Which type of attack is the IT director trying to protect users from?
Correct Answer
C. Virus
Explanation
The IT director is trying to protect users from virus attacks. Opening email messages from suspicious sources can often lead to the introduction of malicious viruses into a system. These viruses can cause harm to the user's computer, steal sensitive information, or disrupt the normal functioning of the system. By reminding users to avoid opening such emails, the IT director is taking preventive measures to mitigate the risk of virus attacks.
8.
Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring?
Correct Answer
C. DoS
Explanation
The correct answer is DoS. In this scenario, the system logs indicate that the server is receiving a high level of fake requests for service, causing it to operate slowly. This is characteristic of a Denial of Service (DoS) attack, where the attacker overwhelms the server with a flood of requests, making it inaccessible to legitimate users.
9.
Refer to the exhibit. What is the purpose of the "ip ospf message-digest-key 1
md5 cisco" statement in the configuration?
Correct Answer
A. To specify a key that is used to authenticate routing updates
Explanation
The "ip ospf message-digest-key 1 md5 cisco" statement in the configuration is used to specify a key that is used to authenticate routing updates. This key is used to verify the authenticity of OSPF messages exchanged between routers in the network. By using this key, routers can ensure that the routing updates they receive are from trusted sources and have not been tampered with. This helps to maintain the integrity and security of the OSPF routing protocol.
10.
Which two statements define the security risk when DNS services are enabled on the network?(Choose two.)
Correct Answer(s)
A. By default, name queries are sent to the broadcast address 255.255.255.255.
D. The basic DNS protocol does not provide authentication or integrity assurance.
Explanation
The first statement explains that when DNS services are enabled on the network, name queries are sent to the broadcast address 255.255.255.255 by default. This can be a security risk as it allows anyone on the network to intercept and respond to these queries, potentially leading to DNS spoofing attacks.
The second statement highlights another security risk, stating that the basic DNS protocol does not provide authentication or integrity assurance. This means that there is no built-in mechanism to verify the authenticity or integrity of DNS responses, making it susceptible to DNS cache poisoning and other types of attacks.
11.
Which two statements are true about network attacks? (Choose two.)
Correct Answer(s)
D. A brute-force attack searches to try every possible password from a combination of characters.
E. Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection.
Explanation
The first true statement is that a brute-force attack searches to try every possible password from a combination of characters. This type of attack is time-consuming but can eventually crack a password by systematically trying all possible combinations.
The second true statement is that devices in the DMZ (Demilitarized Zone) should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection. The DMZ is a network segment that separates the internal network from the external network, and it is important to have security measures in place to protect the internal network from potential attacks originating from the DMZ.
12.
Refer to the exhibit. A network administrator is trying to configure a router to
use SDM, but it is not functioning correctly. What could be the problem?
Correct Answer
A. The privilege level of the user is not configured correctly.
Explanation
The problem could be that the privilege level of the user is not configured correctly. This means that the user does not have the necessary privileges to access and configure the router using SDM.
13.
Refer to the exhibit. The network administrator is trying to back up the Cisco
IOS router software and receives the output shown. What are two possible reasons
for this output? (Choose two.)
Correct Answer(s)
C. The router cannot connect to the TFTP server.
D. The TFTP server software has not been started.
Explanation
The output suggests that there are two possible reasons for the issue. First, the router cannot connect to the TFTP server, which means there could be a network connectivity problem between the router and the server. Second, the TFTP server software has not been started, indicating that the server may not be running or properly configured to receive the backup request from the router.
14.
Which two statements are true regarding network security? (Choose two.)
Correct Answer(s)
B. Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security.
E. Protecting network devices from pHysical damage caused by water or electricity is a necessary part of the security policy.
Explanation
The statement "Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security" is true because both skilled hackers and inexperienced individuals can exploit vulnerabilities in a network to gain unauthorized access or cause damage. The statement "Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy" is also true because physical damage can disrupt network operations and compromise security.
15.
The password recovery process begins in which operating mode and using what type of connection? (Choose two.)
Correct Answer(s)
A. ROM monitor
D. Direct connection through the console port
Explanation
The password recovery process begins in the ROM monitor mode and requires a direct connection through the console port. The ROM monitor mode is a separate operating mode that allows access to the router's bootstrap program. By connecting directly through the console port, the user can access the ROM monitor mode and initiate the password recovery process. This mode allows the user to bypass the normal startup sequence and gain access to the router's configuration files and settings.
16.
Which two objectives must a security policy accomplish? (Choose two.)
Correct Answer(s)
C. Document the resources to be protected
D. Identify the security objectives of the organization
Explanation
A security policy must document the resources that need to be protected in order to establish a baseline for security measures and ensure that appropriate safeguards are in place. Additionally, identifying the security objectives of the organization is important as it helps in defining the overall goals and priorities for security measures and allows for the development of strategies and tactics to achieve those objectives.
17.
Which statement is true about Cisco Security Device Manager (SDM)?
Correct Answer
B. SDM can be run from router memory or from a PC.
Explanation
SDM can be run from router memory or from a PC, meaning it offers flexibility in terms of where it can be accessed and used. It allows users to manage and configure Cisco routers either directly from the router itself or from a PC connected to the network. This allows for ease of use and accessibility, as users can choose the method that is most convenient for them.
18.
Which step is required to recover a lost enable password for a router?
Correct Answer
A. Set the configuration register to bypass the startup configuration.
Explanation
To recover a lost enable password for a router, the configuration register needs to be set to bypass the startup configuration. This allows the router to boot up without loading the saved configuration, effectively bypassing the password requirement. By doing this, the administrator can gain access to the router and then reset the enable password to regain control. This step is necessary because copying the running configuration to the startup configuration, reloading the IOS from a TFTP server, or reconfiguring the router using setup mode will not directly address the issue of a lost enable password.
19.
Refer to the exhibit. Security Device Manager (SDM) is installed on router R1.
What is the result of opening a web browser on PC1 and entering the URL https://192.168.10.1?
Correct Answer
C. The SDM page of R1 appears with a dialog box that requests a username and password.
Explanation
Entering the URL https://192.168.10.1 will open the SDM page of router R1. This page will display a dialog box that requests a username and password, indicating that authentication is required to access the SDM.
20.
Intrusion detection occurs at which stage of the Security Wheel?
Correct Answer
B. Monitoring
Explanation
Intrusion detection occurs at the monitoring stage of the Security Wheel. This is because monitoring involves actively observing and analyzing network traffic, system logs, and other security events to identify any suspicious or unauthorized activities. Intrusion detection systems (IDS) are specifically designed to detect and alert on potential intrusions or security breaches. By monitoring network and system activities, organizations can quickly identify and respond to potential threats, minimizing the impact of security incidents.
21.
Refer to the exhibit. Security Device Manager (SDM) has been used to configure a
required level of security on the router. What would be accomplished when the
SDM applies the next step on the security problems that are identified on the
router?
Correct Answer
D. SDM will reconfigure the services that are marked in the exhibit as “fix it” to apply the suggested security changes.
Explanation
When the SDM applies the next step on the security problems identified on the router, it will reconfigure the services that are marked as "fix it" in the exhibit. This means that the SDM will make the necessary changes to the router's services in order to apply the suggested security changes. This ensures that the router's security is improved and any vulnerabilities are addressed.
22.
What are two benefits of using Cisco AutoSecure? (Choose two.)
Correct Answer(s)
B. It offers the ability to instantly disable non-essential system processes and services.
E. It allows the administrator to configure security policies without having to understand all of the Cisco IOS software features.
Explanation
Cisco AutoSecure offers the ability to instantly disable non-essential system processes and services, which helps in improving the security of the network by reducing the attack surface. It also allows the administrator to configure security policies without having to understand all of the Cisco IOS software features, making it easier for non-experts to implement effective security measures.