
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CCNA Security Chapter 4 Answers Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/ccna-security-chapter-4-answers/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.technig.com/tag/ccna-security-chapter-4-answers/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Sun, 29 Mar 2020 11:08:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>CCNA Security Chapter 4 Answers Archives - TECHNIG</title>
	<link>https://www.technig.com/tag/ccna-security-chapter-4-answers/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>CCNA Security Chapter 4 Exam Questions with Answers – Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 30 Aug 2018 01:29:07 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 4 Answers]]></category>
		<category><![CDATA[CCNA Security Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15054</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="583" height="213" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Exam Questions and Answers" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></div>
<p>The latest update of CCNA Security chapter 4 exam questions and answers are available for review and educational purposes. You can find this questions on netacad CCNA Security chapter 4 exam test. Please don&#8217;t forget to share the CCNA Security chapter 4 exam questions via comment section for keeping this list up-to-date. CCNA Security Chapter [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/">CCNA Security Chapter 4 Exam Questions with Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="583" height="213" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Exam Questions and Answers" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></div><p>The latest update of CCNA Security chapter 4 exam questions and answers are available for review and educational purposes. You can find this questions on <a href="https://netacad.com/" target="_blank" rel="noopener noreferrer">netacad</a> CCNA Security chapter 4 exam test.</p>
<p>Please don&#8217;t forget to share the CCNA Security chapter 4 exam questions via comment section for keeping this list up-to-date.</p>
<h3>CCNA Security Chapter 4 Exam Questions with Answers</h3>
<p><strong>1:</strong> What is one benefit of using a stateful firewall instead of a proxy server?</p>
<p style="padding-left: 30px;">prevention of Layer 7 attacks</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">better performance</span></strong></p>
<p style="padding-left: 30px;">ability to perform user authentication</p>
<p style="padding-left: 30px;">ability to perform packet filtering</p>
<p><a style="font-weight: bold; background-color: #ffffff; display: inline !important;" href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-Latest-Update.png"><img decoding="async" class="wp-image-15056 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-Latest-Update.png" alt="CCNA Security Chapter 4 Exam Questions with Answers Latest Update" width="300" height="90" /></a></p>
<p>CCNA Security Chapter 4 Exam Questions</p>
<p><strong>2:</strong> Refer to the exhibit. Which statement describes the function of the ACEs?</p>
<p style="padding-left: 30px;">These ACEs automatically appear at the end of every IPv6 ACL to allow IPv6 routing to occur.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">These ACEs allow for IPv6 neighbor discovery traffic.</span></strong></p>
<p style="padding-left: 30px;">These are optional ACEs that can be added to the end of an IPv6 ACL to allow ICMP messages that are defined in object groups named nd-na and nd-ns.</p>
<p style="padding-left: 30px;">These ACEs must be manually added to the end of every IPv6 ACL to allow IPv6 routing to occur.</p>
<p><strong>3:</strong> When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?</p>
<p style="padding-left: 30px;">ACEs to prevent SNMP traffic</p>
<p style="padding-left: 30px;">ACEs to prevent broadcast address traffic</p>
<p style="padding-left: 30px;">ACEs to prevent ICMP traffic</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">ACEs to prevent traffic from private address spaces</span></strong></p>
<p style="padding-left: 30px;">ACEs to prevent HTTP traffic</p>
<p><strong>4:</strong> Which type of packet is unable to be filtered by an outbound ACL?</p>
<p style="padding-left: 30px;">ICMP packet</p>
<p style="padding-left: 30px;">multicast packet</p>
<p style="padding-left: 30px;">broadcast packet</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">router-generated packet</span></strong></p>
<p><strong>5:</strong> Which command will verify a Zone-Based Policy Firewall configuration?</p>
<p style="padding-left: 30px;">show protocols</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">show running-config</span></strong></p>
<p style="padding-left: 30px;">show zones</p>
<p style="padding-left: 30px;">show interfaces</p>
<figure id="attachment_15055" aria-describedby="caption-attachment-15055" style="width: 427px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png"><img decoding="async" class="wp-image-15055 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png" alt="CCNA Security Chapter 4 Exam Questions with Answers" width="427" height="399" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png 427w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers--300x280.png 300w" sizes="(max-width: 427px) 100vw, 427px" /></a><figcaption id="caption-attachment-15055" class="wp-caption-text">CCNA Security Chapter 4 Exam Questions with Answers</figcaption></figure>
<p><strong>6:</strong> Refer to the exhibit. The network &#8220;A&#8221; contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as &#8220;A&#8221;?</p>
<p style="padding-left: 30px;">internal network</p>
<p style="padding-left: 30px;">perimeter security boundary</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">DMZ</span></strong></p>
<p style="padding-left: 30px;">untrusted network</p>
<p><strong>7:</strong> A company is deploying a new network design in which the border router has three interfaces. Interface Serial0/0/0 connects to the ISP, GigabitEthernet0/0 connects to the DMZ, and GigabitEthernet/01 connects to the internal private network. Which type of traffic would receive the least amount of inspection (have the most freedom of travel)?</p>
<p style="padding-left: 30px;">traffic that originates from the public network and that is destined for the DMZ</p>
<p style="padding-left: 30px;">traffic that is returning from the DMZ after originating from the private network</p>
<p style="padding-left: 30px;">traffic that is returning from the public network after originating from the private network</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">traffic that is going from the private network to the DMZ</span></strong></p>
<p><strong>8:</strong> When a Cisco IOS Zone-Based Policy Firewall is being configured via CLI, which step must be taken after zones have been created?</p>
<p style="padding-left: 30px;">Design the physical infrastructure.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Establish policies between zones.</span></strong></p>
<p style="padding-left: 30px;">Assign interfaces to zones.</p>
<p style="padding-left: 30px;">Identify subsets within zones.</p>
<figure id="attachment_15057" aria-describedby="caption-attachment-15057" style="width: 583px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png"><img loading="lazy" decoding="async" class="wp-image-15057 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" alt="CCNA Security Exam Questions and Answers" width="583" height="213" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></a><figcaption id="caption-attachment-15057" class="wp-caption-text">CCNA Security Exam Questions and Answers</figcaption></figure>
<p><strong>9:</strong> Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?</p>
<p style="padding-left: 30px;">The initial packet is dropped, but subsequent packets are forwarded.</p>
<p style="padding-left: 30px;">The packet is forwarded, and no alert is generated.</p>
<p style="padding-left: 30px;">The packet is forwarded, and an alert is generated.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The packet is dropped.</span></strong></p>
<p><strong>10:</strong> Which command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?</p>
<p style="padding-left: 30px;">ipv6 access-class ENG_ACL in</p>
<p style="padding-left: 30px;">ipv6 traffic-filter ENG_ACL out</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">ipv6 traffic-filter ENG_ACL in</span></strong></p>
<p style="padding-left: 30px;">ipv6 access-class ENG_ACL out</p>
<p><strong>11:</strong> Consider the following access list.</p>
<p><strong>access-list 100 permit ip host 192.168.10.1 any</strong><br />
<strong>access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo</strong><br />
<strong>access-list 100 permit ip any any</strong></p>
<p>Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)</p>
<p style="padding-left: 30px;">Only the network device assigned the IP address 192.168.10.1 is allowed to access the router.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Devices on the 192.168.10.0/24 network can sucessfully ping devices on the 192.168.11.0 network.</span></strong></p>
<p style="padding-left: 30px;">Devices on the 192.168.10.0/24 network are not allowed to reply to any ping requests.</p>
<p style="padding-left: 30px;">Only Layer 3 connections are allowed to be made from the router to any other network device.</p>
<p><strong>12:</strong> In addition to the criteria used by extended ACLs, what conditions are used by a classic firewall to filter traffic?</p>
<p style="padding-left: 30px;">IP source and destination addresses</p>
<p style="padding-left: 30px;">TCP/UDP source and destination port numbers</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">application layer protocol session information</span></strong></p>
<p style="padding-left: 30px;">TCP/IP protocol numbers</p>
<p><strong>13:</strong> To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?</p>
<p style="padding-left: 30px;">time-stamp request</p>
<p style="padding-left: 30px;">router advertisement</p>
<p style="padding-left: 30px;">time-stamp reply</p>
<p style="padding-left: 30px;">echo request</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">echo reply</span></strong></p>
<p><a style="font-weight: bold; background-color: #ffffff; display: inline !important;" href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-15058 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg" alt="CCNA Security Exam Answers" width="572" height="46" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg 572w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers--300x24.jpg 300w" sizes="(max-width: 572px) 100vw, 572px" /></a></p>
<p>CCNA Security Exam Answers</p>
<p><strong>14:</strong> Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Choose two.)</p>
<p style="padding-left: 30px;">SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.</p>
<p style="padding-left: 30px;">Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.</p>
<p style="padding-left: 30px;">Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.</span></strong></p>
<p style="padding-left: 30px;">SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.</p>
<p><strong>15:</strong> Which two rules about interfaces are valid when implementing a Zone-Based Policy Firewall? (Choose two.)</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">If neither interface is a zone member, then the action is to pass traffic.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">If both interfaces are members of the same zone, all traffic will be passed.</span></strong></p>
<p style="padding-left: 30px;">If one interface is a zone member and a zone-pair exists, all traffic will be passed.</p>
<p style="padding-left: 30px;">If one interface is a zone member, but the other is not, all traffic will be passed.</p>
<p style="padding-left: 30px;">If both interfaces belong to the same zone-pair and a policy exists, all traffic will be passed.</p>
<p><strong>16:</strong> When a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)</p>
<p style="padding-left: 30px;">hold</p>
<p style="padding-left: 30px;">copy</p>
<p style="padding-left: 30px;">forward</p>
<p style="padding-left: 30px;">log</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>drop</strong></span></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">inspect</span></strong></p>
<p><strong>17:</strong> If the provided ACEs are in the same ACL, which ACE should be listed first in the ACL according to best practice?</p>
<p style="padding-left: 30px;">permit tcp 172.16.0.0 0.0.3.255 any established</p>
<p style="padding-left: 30px;">permit udp any any range 10000 20000</p>
<p style="padding-left: 30px;">deny tcp any any eq telnet</p>
<p style="padding-left: 30px;">permit ip any any</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">permit udp 172.16.0.0 0.0.255.255 host 172.16.1.5 eq snmptrap</span></strong></p>
<p style="padding-left: 30px;">deny udp any host 172.16.1.5 eq snmptrap</p>
<p><strong>18:</strong> What is the function of the pass action on a Cisco IOS Zone-Based Policy Firewall?</p>
<p style="padding-left: 30px;">tracking the state of connections between zones</p>
<p style="padding-left: 30px;">inspecting traffic between zones for traffic control</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">forwarding traffic from one zone to another</span></strong></p>
<p style="padding-left: 30px;">logging of rejected or dropped packets</p>
<p><strong>19:</strong> A router has been configured as a classic firewall and an inbound ACL applied to the external interface. Which action does the router take after inbound-to-outbound traffic is inspected and a new entry is created in the state table?</p>
<p style="padding-left: 30px;">When traffic returns from its destination, it is reinspected, and a new entry is added to the state table.</p>
<p style="padding-left: 30px;">The internal interface ACL is reconfigured to allow the host IP address access to the Internet.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A dynamic ACL entry is added to the external interface in the inbound direction.</span></strong></p>
<p style="padding-left: 30px;">The entry remains in the state table after the session is terminated so that it can be reused by the host.</p>
<p><strong>20:</strong> Which statement describes a typical security policy for a DMZ firewall configuration?</p>
<p style="padding-left: 30px;">Traffic that originates from the inside interface is generally blocked entirely or very selectively permitted to the outside interface.</p>
<p style="padding-left: 30px;">Return traffic from the inside that is associated with traffic originating from the outside is permitted to traverse from the inside interface to the outside interface.</p>
<p style="padding-left: 30px;">Return traffic from the outside that is associated with traffic originating from the inside is permitted to traverse from the outside interface to the DMZ interface.</p>
<p style="padding-left: 30px;">Traffic that originates from the outside interface is permitted to traverse the firewall to the inside interface with few or no restrictions.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Traffic that originates from the DMZ interface is selectively permitted to the outside interface.</span></strong></p>
<p><strong>21:</strong> A network administrator is implementing a Classic Firewall and a Zone-Based Firewall concurrently on a router. Which statement best describes this implementation?</p>
<p style="padding-left: 30px;">A Classic Firewall and Zone-Based Firewall cannot be used concurrently.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The two models cannot be implemented on a single interface.</span></strong></p>
<p style="padding-left: 30px;">An interface must be assigned to a security zone before IP inspection can occur.</p>
<p style="padding-left: 30px;">Both models must be implemented on all interfaces.</p>
<p><strong>22:</strong> What is one limitation of a stateful firewall?</p>
<p style="padding-left: 30px;">poor log information</p>
<p style="padding-left: 30px;">cannot filter unnecessary traffic</p>
<p style="padding-left: 30px;">weak user authentication</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>not as effective with UDP- or ICMP-based traffic</strong></span></p>
<p><strong>23:</strong> Which security tool monitors network traffic as it flows into and out of the organization and determines whether packets belong to an existing connection or are from an unauthorized source?</p>
<p style="padding-left: 30px;">web security appliance</p>
<p style="padding-left: 30px;">application proxy</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>stateful firewall</strong></span></p>
<p style="padding-left: 30px;">intrusion protection system</p>
<p>That&#8217;s all the updated CCNA Security chapter 4 exam questions and answers you need to review and test to learn more about CCNA security chapter 4 exam questions.</p>
<hr />
<p><strong> Related Questions: CCNA Security chapter 4 exam questions and answers</strong></p>
<p>CCNA security chapter 4 exam answers<br />
CCNA security chapter 4 exam answers 2018<br />
CCNA security final exam answers 2018<br />
CCNAs chapter 2 exam answers<br />
The inspect action in a cisco ios zone-based policy firewall configures cisco ios packet inspection.<br />
CCNA security netacad<br />
CCNA security chapter 5 exam answers 2018<br />
A Cisco ids does not affect the flow of traffic when it operates in promiscuous mode.</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/">CCNA Security Chapter 4 Exam Questions with Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15054</post-id>	</item>
	</channel>
</rss>
