TECHNIG
Gateway for IT Experts and Tech Geeks

CCNA Security Chapter 3 Exam Questions With Answers – Updated

Updated CCNA Security Exam Questions and Answers. CCNA Security Chapter 3 Exam Answers

Looking for CCNA Security Exam Answers? Here you can test and review all updated CCNA Security Chapter 3 exam questions and answers. It is just for educational purposes.

These questions are the latest CCNA security chapter 3 exam questions with answers. Please share the new questions through the comment section. We will reply it with the correct answer.

CCNA Security Chapter 3 Exam Questions and Answers

CCNA Security Chapter 3 Exam Questions With Answers
CCNA Security Chapter 3 Exam Questions With Answers

1: Refer to the exhibit. Which statement describes the configuration of the ports for Server1?

The configuration is using the default ports for a Cisco router.

The configuration will not be active until it is saved and Rtr1 is rebooted.

The configuration of the ports requires 1812 be used for the authentication and the authorization ports.

The ports configured for Server1 on the router must be identical to those configured on the RADIUS server.

2: Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per-group basis?

SSH

RADIUS

TACACS+

ACS

3: Why would a network administrator include a local username configuration, when the AAA-enabled router is also configured to authenticate using several ACS servers?

The local username database will provide a backup for authentication in the event the ACS servers become unreachable.

A local username database is required when configuring authentication using ACS servers.

Because ACS servers only support remote user access, local users can only authenticate using a local username database.

Without a local username database, the router will require successful authentication with each ACS server.

4: Which debug command is used to focus on the status of a TCP connection when using TACACS+ for authentication?

debug tacacs accounting

debug aaa authentication

debug tacacs events

debug tacacs

5: What difference exists when using Windows Server as an AAA server, rather than Cisco Secure ACS?

Windows Server only supports AAA using TACACS.

Windows Server uses its own Active Directory (AD) controller for authentication and authorization.

Windows Server cannot be used as an AAA server.

Windows Server requires more Cisco IOS commands to configure.

6: What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?

MD5

RADIUS

SSH

TACACS+

7: Which solution supports AAA for both RADIUS and TACACS+ servers?

Implement Cisco Secure Access Control System (ACS) only.

RADIUS and TACACS+ servers cannot be supported by a single solution.

Implement both a local database and Cisco Secure Access Control System (ACS).

Implement a local database.

8: What is a characteristic of TACACS+?

TACACS+ is backward compatible with TACACS and XTACACS.

TACACS+ uses UDP port 1645 or 1812 for authentication, and UDP port 1646 or 1813 for accounting.

TACACS+ provides authorization of router commands on a per-user or per-group basis.

TACACS+ is an open IETF standard.

9: Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?

accessibility

authorization

authentication

auditing

accounting

10: When a method list for AAA authentication is being configured, what is the effect of the keyword local?

The login succeeds, even if all methods return an error.

It uses the enable password for authentication.

It accepts a locally configured username, regardless of case.

It defaults to the vty line password for authentication.

11: Why is authentication with AAA preferred over a local database method?

It uses less network bandwidth.

It requires a login and password combination on the console, vty lines, and aux ports.

It provides a fallback authentication method if the administrator forgets the username or password.

It specifies a different password for each line or port.

12: Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

accounting

accessibility

authentication

authorization

13: What is a characteristic of AAA accounting?

Accounting can only be enabled for network connections.

Users are not required to be authenticated before AAA accounting logs their activities on the network.

Accounting is concerned with allowing and disallowing authenticated users access to certain areas and programs on the network.

Possible triggers for the aaa accounting exec default command include start-stop and stop-only.

14: A user complains about being locked out of a device after too many unsuccessful AAA login attempts. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device?

Use the login delay command for authentication attempts.

Use the none keyword when configuring the authentication method list.

Use the aaa local authentication attempts max-fail global configuration mode command with a higher number of acceptable failures.

Use the login local command for authenticating user access.

15: What device is considered a supplicant during the 802.1X authentication process?

the switch that is controlling network access

the client that is requesting authentication

the router that is serving as the default gateway

the authentication server that is performing client authentication

16: Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)

password encryption

separate authentication and authorization processes

802.1X support

SIP support

utilization of transport layer protocols

17: Which characteristic is an important aspect of authorization in an AAA-enabled network device?

The authorization feature enhances network performance.

User access is restricted to certain services.

A user must be identified before network access is granted.

User actions are recorded for use in audits and troubleshooting events.

CCNA Security Chapter 3 Exam Questions With Answers – Updated
CCNA Security Chapter 3 Exam Questions With Answers – Updated
18: Refer to the exhibit. Router R1 has been configured as shown, with the resulting log message. On the basis of the information that is presented, which two statements describe the result of AAA authentication operation? (Choose two.)

The locked-out user stays locked out until the clear aaa local user lockout username Admin command is issued.

The locked-out user failed authentication.

The locked-out user stays locked out until the interface is shut down then re-enabled.

The locked-out user should have used the username admin and password Str0ngPa55w0rd.

The locked-out user is locked out for 10 minutes by default.

19: True or False? The single-connection keyword prevents the configuration of multiple TACACS+ servers on a AAA-enabled router.

true

false

20: What is the result of entering the aaa accounting network command on a router?

The router outputs accounting data for all outbound connections such as SSH and Telnet.

The router collects and reports usage data related to network-related service requests.

The router provides data for only internal service requests.

The router outputs accounting data for all EXEC shell sessions.

21: Which authentication method stores usernames and passwords in the router and is ideal for small networks?

local AAA

server-based AAA over TACACS+

server-based AAA

local AAA over TACACS+

local AAA over RADIUS

server-based AAA over RADIUS

22: A user complains about not being able to gain access to a network device configured with AAA. How would the network administrator determine if login access for the user account is disabled?

Use the show aaa user command.

Use the show aaa local user lockout command .

Use the show aaa sessions command .

Use the show running-configuration command .

23: When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?

the supplicant

the authentication server

the switch that the client is connected to

the router that is serving as the default gateway

That’s all the latest CCNA Security chapter 3 exam questions and answers. Please share the new CCNA Security exam questions via the comment section.


Related Questions:

CCNA security chapter 3 exam answers 2018
CCNA security 2.0 hands-on skills exam
CCNA security chapter 3 exam answers
CCNA Security exam questions and answers pdf
CCNA security v2.0 exam answers
CCNA security final exam packet tracer
Which solution supports aaa for both radius and tacacs+ servers?
What is a characteristic of aaa accounting?
CCNA security final exam answers 2018
CCNA security netacad

Leave A Reply

Your email address will not be published.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

where to buy viagra buy generic 100mg viagra online
buy amoxicillin online can you buy amoxicillin over the counter
buy ivermectin online buy ivermectin for humans
viagra before and after photos how long does viagra last
buy viagra online where can i buy viagra