
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CCNA Security Exam Answers Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/ccna-security-exam-answers/feed/" rel="self" type="application/rss+xml" />
	<link>https://168.138.42.164/tag/ccna-security-exam-answers/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Sun, 29 Mar 2020 11:08:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>CCNA Security Exam Answers Archives - TECHNIG</title>
	<link>https://168.138.42.164/tag/ccna-security-exam-answers/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>CCNA Security Chapter 5 Exam Questions With Answers – Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Tue, 25 Sep 2018 03:22:51 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Exam Questions]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 5 Answers]]></category>
		<category><![CDATA[CCNA Security Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15194</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="654" height="384" src="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 5 Exam Questions With Answers – Updated" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg 654w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-300x176.jpeg 300w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-357x210.jpeg 357w" sizes="(max-width: 654px) 100vw, 654px" /></div>
<p>These are all updated CCNA Security chapter 5 exam questions with answers. If you have the new question on this test, please comment question. We will update answers for you in the shortest time. 1. An IPS sensor has detected the string confidential across multiple packets in a TCP session. Which type of signature trigger [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/">CCNA Security Chapter 5 Exam Questions With Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="654" height="384" src="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Chapter 5 Exam Questions With Answers – Updated" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg 654w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-300x176.jpeg 300w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-357x210.jpeg 357w" sizes="(max-width: 654px) 100vw, 654px" /></div><p>These are all updated CCNA Security chapter 5 exam questions with answers. If you have the new question on this test, please comment question. We will update answers for you in the shortest time.</p>
<p><strong>1.</strong> An IPS sensor has detected the string confidential across multiple packets in a TCP session. Which type of signature trigger and signature type does this describe?</p>
<ul style="list-style-type: circle;">
<li><strong>Trigger: Pattern-based detection</strong><br />
<strong>Type: Composite signature</strong></li>
<li>Trigger: Policy-based detection<br />
Type: Composite signature</li>
<li>Trigger: Pattern-based detection<br />
Type: Atomic signature</li>
<li>Trigger: Anomaly-based detection<br />
Type: Composite signature</li>
<li>Trigger: Policy-based detection<br />
Type: Atomic signature</li>
<li>Trigger: Anomaly-based detection<br />
Type: Atomic signature</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Pattern-based detection (also called signature-based detection) searches for a specific pattern that can be textual, binary, or a series of function calls. It can be detected in a single packet (atomic) or in a packet sequence (composite).</p>
</div>
<p><strong>2.</strong> What is a required condition to enable IPS activity reporting using the SDEE format?</p>
<ul style="list-style-type: circle;">
<li>Issue the ip ips notify log command.</li>
<li>Configure the signature category.</li>
<li>Create an IOS IPS configuration directory in flash.</li>
<li><strong>Enable an HTTP or HTTPS service on the router.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>To enable IPS activity reporting format using SDEE, the HTTP or HTTPS server must first be enabled on the router. If the HTTP server is not enabled, the router cannot respond to the SDEE clients because it cannot see the requests. The ip ips notify log command will send notification using syslog. The tasks of configuring the signature category and creating an IOS IPS configuration directory in flash are necessary to implement IOS IPS, but they are not directly associated with SDEE feature.</p>
</div>
<figure id="attachment_15200" aria-describedby="caption-attachment-15200" style="width: 654px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg"><img decoding="async" class="size-full wp-image-15200" src="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg" alt="CCNA Security Chapter 5 Exam Questions With Answers – Updated" width="654" height="384" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated.jpeg 654w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-300x176.jpeg 300w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Chapter-5-Exam-Questions-With-Answers-–-Updated-357x210.jpeg 357w" sizes="(max-width: 654px) 100vw, 654px" /></a><figcaption id="caption-attachment-15200" class="wp-caption-text">CCNA Security Chapter 5 Exam Questions With Answers – Updated</figcaption></figure>
<p><strong>3.</strong> Refer to the exhibit. Based on the configuration, which traffic will be examined by the IPS that is configured on router R1?</p>
<ul style="list-style-type: circle;">
<li>return traffic from the web server</li>
<li>traffic that is destined to LAN 1 and LAN 2</li>
<li>traffic that is initiated from LAN 1 and LAN 2</li>
<li><strong>no traffic will be inspected</strong></li>
<li>http traffic that is initiated from LAN 1</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Because the IPS inspection is configured on the S0/0/0 interface with inbound direction, but the ACL source address range is 192.168.0.0/16 and the traffic type is http established, there will be no traffic to match these criteria (note, there is no web server on LAN 1 or LAN 2). Hence no traffic inspection will take place.</p>
</div>
<p><strong>4</strong>. A network administrator is configuring an IOS IPS with the command</p>
<p>R1(config)# ip ips<strong> signature-definition</strong></p>
<p>Which configuration task can be achieved with this command?</p>
<ul style="list-style-type: circle;">
<li>Retire or unretire the ios_ips basic signature category.</li>
<li>Retire or unretire the all atomic signatures category.</li>
<li><strong>Retire or unretire an individual signature.</strong></li>
<li>Retire or unretire the all signature category.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The IOS command ip ips signature-definition is used to configure a specific signature, including retire/unretire and event action. To configure a signature category, the command ip ips signature-category is used.</p>
</div>
<p><strong>5.</strong> What information must an IPS track in order to detect attacks matching a composite signature?</p>
<ul style="list-style-type: circle;">
<li><strong>the state of packets related to the attack</strong></li>
<li>the network bandwidth consumed by all packets</li>
<li>the attacking period used by the attacker</li>
<li>the total number of packets in the attack</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>A composite signature is called a stateful signature. It identifies a sequence of operations distributed across multiple hosts over an arbitrary period of time. Because this type of attack involves multiple packets, an IPS sensor must maintain the state information. However, an IPS sensor cannot maintain the state information indefinitely. A composite signature is configured with a time period to maintain the state for the specific attack when it is first detected. Thus, an IPS may not be able to maintain all the information related to an attack such as total number of packets, total length of attack time, and the amount of bandwidth consumed by the attack.</p>
</div>
<figure id="attachment_15201" aria-describedby="caption-attachment-15201" style="width: 341px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Exam-Questions.png"><img decoding="async" class="size-full wp-image-15201" src="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Exam-Questions.png" alt="CCNA Security Exam Questions" width="341" height="42" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Exam-Questions.png 341w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Exam-Questions-300x37.png 300w" sizes="(max-width: 341px) 100vw, 341px" /></a><figcaption id="caption-attachment-15201" class="wp-caption-text">CCNA Security Exam Questions</figcaption></figure>
<p><strong>6.</strong> Refer to the exhibit. A network administrator enters the command on a Cisco IOS IPS router. What is the effect?</p>
<ul style="list-style-type: circle;">
<li>Alert messages are sent in Security Device Event Exchange (SDEE) format.</li>
<li><strong>Alert messages are sent in syslog format.</strong></li>
<li>Alert messages are sent in trace file format.</li>
<li>Alert messages are sent in event log format.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The ip ips notify command is used to set the IPS event notification. This command has two options, log and sdee. The log option is to specify that notifications are sent in syslog format. The sdee option is to specify that notifications are sent in SDEE format. If no option is specified, by default, notifications are sent in syslog format.</p>
</div>
<p><strong>7.</strong> What is the purpose in configuring an IOS IPS crypto key when enabling IOS IPS on a Cisco router?</p>
<ul style="list-style-type: circle;">
<li>to enable Cisco Configuration Professional to be launched securely</li>
<li>to secure the IOS image in flash</li>
<li><strong>to verify the digital signature for the master signature file</strong></li>
<li>to encrypt the master signature file</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The crypto key verifies the digital signature for the master signature file (sigdef-default.xml). The content of the file is signed by a Cisco private key to guarantee its authenticity and integrity.</p>
</div>
<p><strong>8.</strong> What is a disadvantage of network-based IPS as compared to host-based IPS?</p>
<ul style="list-style-type: circle;">
<li>Network-based IPS should not be used with multiple operating systems.</li>
<li>Network-based IPS does not detect lower level network events.</li>
<li>Network-based IPS is less cost-effective.</li>
<li><strong>Network-based IPS cannot examine encrypted traffic.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Network-based IPS devices are implemented as inline mode to actively monitor the traffic on networks. They can take immediate actions when security criteria match. One limitation of them is that they cannot monitor/inspect encrypted packets.</p>
</div>
<p><strong>9.</strong> True or False?<br />
A Cisco IDS does not affect the flow of traffic when it operates in promiscuous mode.</p>
<ul style="list-style-type: circle;">
<li><strong>true</strong></li>
<li>false</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>In promiscuous mode, also known as passive mode, the flow of traffic is unaffected because the IDS sensor analyzes copies of traffic instead of actual forwarded packets.</p>
</div>
<p><strong>10.</strong> What is a disadvantage of a pattern-based detection mechanism?</p>
<ul style="list-style-type: circle;">
<li>The normal network traffic pattern must be profiled first.</li>
<li>It is difficult to deploy in a large network.</li>
<li><strong>It cannot detect unknown attacks.</strong></li>
<li>Its configuration is complex.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>An IDS/IPS with pattern-based detection, also known as signature-based detection, compares the network traffic to a database of known attacks (signature files) and triggers an alarm or prevents communication if a match is found. The signatures must be created first. Hence this type of intrusion detection cannot detect unknown attacks. It is easy to configure and to deploy. Its operation does not depend on the information of normal network behavior (or baseline).</p>
</div>
<p><strong>11.</strong> A security specialist configures an IPS so that it will generate an alert when an attack is first detected. Alerts for the subsequent detection of the same attack are suppressed for a pre-defined period of time. Another alert will be generated at the end of the period indicating the number of the attack detected. Which IPS alert monitoring mechanism is configured?</p>
<ul style="list-style-type: circle;">
<li>atomic alert</li>
<li>correlation alert</li>
<li>composite alert</li>
<li><strong>summary alert</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Alerts generated by an IPS should be monitored closely to ensure proper actions are taken against malicious attacks. IPS solutions incorporate two types of alerts, atomic alerts and summary alerts. Atomic alerts are generated every time a signature triggers. A summary alert is a single alert that indicates multiple occurrences of the same signature from the same source address or port. With a summary alter, the first detection of the attack triggers a normal alert. Subsequent detection of the same attack is counted until the end of the signature summary interval. When the length of time specified by the summary interval has elapsed, a summary alarm is sent, indicating the number of alarms that occurred during the time interval.</p>
</div>
<p><strong>12.</strong> What are two disadvantages of using an IDS? (Choose two.)</p>
<ul style="list-style-type: circle;">
<li><strong>The IDS does not stop malicious traffic.</strong></li>
<li>The IDS works offline using copies of network traffic.</li>
<li>The IDS has no impact on traffic.</li>
<li>The IDS analyzes actual forwarded packets.</li>
<li><strong>The IDS requires other devices to respond to attacks.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The disadvantage of operating with mirrored traffic is that the IDS cannot stop malicious single-packet attacks from reaching the target before responding to the attack. Also, an IDS often requires assistance from other networking devices, such as routers and firewalls, to respond to an attack. An advantage of an IDS is that by working offline using mirrored traffic, it has no impact on traffic flow.</p>
</div>
<figure id="attachment_15202" aria-describedby="caption-attachment-15202" style="width: 414px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Questions-and-Answers.png"><img loading="lazy" decoding="async" class="size-full wp-image-15202" src="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Questions-and-Answers.png" alt="CCNA Security Questions and Answers" width="414" height="147" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Questions-and-Answers.png 414w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Questions-and-Answers-300x107.png 300w" sizes="(max-width: 414px) 100vw, 414px" /></a><figcaption id="caption-attachment-15202" class="wp-caption-text">CCNA Security Questions and Answers</figcaption></figure>
<p><strong>13.</strong> Refer to the exhibit. Based on the IPS configuration provided, which conclusion can be drawn?</p>
<ul style="list-style-type: circle;">
<li>The signatures in all categories will be retired and not be used by the IPS.</li>
<li>The signatures in all categories will be compiled into memory and used by the IPS.</li>
<li><strong>Only the signatures in the ios_ips basic category will be compiled into memory and used by the IPS.</strong></li>
<li>The signatures in the ios_ips basic category will be retired and the remaining signatures will be compiled into memory and used by the IPS.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The IPS signature in the all category is retired, which means no signatures are compiled into memory. The IPS signature ios_ips basic category is unretired (by the command retired false), resulting in the signatures in the ios_ips basic being compiled into RAM for traffic inspection.</p>
</div>
<p><strong>14.</strong> What are two drawbacks to using HIPS? (Choose two.)</p>
<ul style="list-style-type: circle;">
<li><strong>With HIPS, the network administrator must verify support for all the different operating systems used in the network.</strong></li>
<li>HIPS installations are vulnerable to fragmentation attacks or variable TTL attacks.</li>
<li><strong>HIPS has difficulty constructing an accurate network picture or coordinating events that occur across the entire network.</strong></li>
<li>If the network traffic stream is encrypted, HIPS is unable to access unencrypted forms of the traffic.</li>
<li>With HIPS, the success or failure of an attack cannot be readily determined.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Network-based IPS devices are implemented in inline mode to actively monitor the traffic on networks. They can take immediate actions when security criteria match. They can be implemented with dedicated appliances or as a feature on a Cisco router. Multiple types of detection mechanisms can be implemented in IPS, including signature-based and anomaly-based detection. One limitation of an IPS is that it cannot monitor or inspect encrypted packets.</p>
</div>
<p><strong>15.</strong> Which two benefits does the IPS version 5.x signature format provide over the version 4.x signature format? (Choose two.)</p>
<ul style="list-style-type: circle;">
<li>support for IPX and AppleTalk protocols</li>
<li><strong>addition of a signature risk rating</strong></li>
<li><strong>support for encrypted signature parameters</strong></li>
<li>addition of signature micro engines</li>
<li>support for comma-delimited data import</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Since IOS 12.4(11)T, Cisco introduced version 5.x IPS signature format. The new version supports encrypted signature parameters and other features such as signature risk rating, which rates the signature on security risk.</p>
</div>
<p><strong>16.</strong> In configuring a Cisco router to prepare for IPS and VPN features, a network administrator opens the file realm-cisco.pub.key.txt, and copies and pastes the contents to the router at the global configuration prompt. What is the result after this configuration step?</p>
<ul style="list-style-type: circle;">
<li>A pair of public/secret keys is created for IPsec VPN operation.</li>
<li>The router is authenticated with the Cisco secure IPS resource web server.</li>
<li><strong>A crypto key is created for IOS IPS to verify the master signature file.</strong></li>
<li>A pair of public/secret keys is created for the router to serve as an SSH server.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The third step in implementing IOS IPS is to configure the Cisco IOS IPS public key that is located in the realm-cisco.pub.key.txt file. This public key is used to verify digital signature for the master signature file, and can be downloaded from cisco.com. To configure the IOS IPS crypto key, open the text file, and copy and paste the contents to the router at the global configuration prompt. Public/private key pairs for IPsec VPN and SSH server are generated using different methods.</p>
</div>
<figure id="attachment_15203" aria-describedby="caption-attachment-15203" style="width: 492px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Exam-Chapter-5-Exam-Questions.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-15203" src="http://3.90.216.52/wp-content/uploads/2018/09/CCNA-Security-Exam-Chapter-5-Exam-Questions.jpg" alt="CCNA Security Exam Chapter 5 Exam Questions" width="492" height="186" srcset="https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Exam-Chapter-5-Exam-Questions.jpg 492w, https://www.technig.com/wp-content/uploads/2018/09/CCNA-Security-Exam-Chapter-5-Exam-Questions-300x113.jpg 300w" sizes="(max-width: 492px) 100vw, 492px" /></a><figcaption id="caption-attachment-15203" class="wp-caption-text">CCNA Security Exam Chapter 5 Exam Questions</figcaption></figure>
<p><strong>17.</strong> Refer to the exhibit. Which statement best describes how incoming traffic on serial 0/0 is handled?</p>
<ul style="list-style-type: circle;">
<li>Traffic not matching ACL 100 will be scanned and reported.</li>
<li><strong>Traffic matching ACL 100 will be scanned and reported.</strong></li>
<li>Traffic that is sourced from 172.31.235.0/24 will be scanned and reported.</li>
<li>Traffic that is coming from any source other than 172.31.235.0/24 will be scanned and reported.</li>
<li>Traffic not matching ACL 100 will be dropped.</li>
<li>Traffic that is sourced from 172.31.235.0/24 will be sent directly to its destination without being scanned or reported.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>From the configuration, ACL 100 is used to identify matching packets to be inspected. However, since the ACL 100 configuration is unknown (not displayed), the only conclusion we can draw for sure is that “Traffic matching ACL 100 will be scanned and reported.”</p>
</div>
<p><strong>18.</strong> Which type of IPS signature detection is used to distract and confuse attackers?</p>
<ul style="list-style-type: circle;">
<li>anomaly-based detection</li>
<li><strong>honeypot-based detection</strong></li>
<li>pattern-based detection</li>
<li>policy-based detection</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The honeypot-based detection method uses dummy servers to attract attacks. The purpose of the honey pot approach is to distract attacks away from real network devices. After capturing the attack activities on honeypot servers, network administrators can analyze incoming types of attacks and malicious traffic patterns.</p>
</div>
<figure id="attachment_15204" aria-describedby="caption-attachment-15204" style="width: 434px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2018/09/Cisco-IPS-Configuration.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-15204" src="http://3.90.216.52/wp-content/uploads/2018/09/Cisco-IPS-Configuration.jpg" alt="Cisco IPS Configuration" width="434" height="106" srcset="https://www.technig.com/wp-content/uploads/2018/09/Cisco-IPS-Configuration.jpg 434w, https://www.technig.com/wp-content/uploads/2018/09/Cisco-IPS-Configuration-300x73.jpg 300w" sizes="(max-width: 434px) 100vw, 434px" /></a><figcaption id="caption-attachment-15204" class="wp-caption-text">Cisco IPS Configuration</figcaption></figure>
<p><strong>19.</strong> Refer to the exhibit. What is the result of issuing the Cisco IOS IPS commands on router R1?</p>
<ul style="list-style-type: circle;">
<li>All traffic that is denied by the ACL is subject to inspection by the IPS.</li>
<li>A named ACL determines the traffic to be inspected.</li>
<li>A numbered ACL is applied to S0/0/0 in the outbound direction.</li>
<li><strong>All traffic that is permitted by the ACL is subject to inspection by the IPS.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>In configuring IOS IPS with the command ip ips, an optional extended or standard ACL can be used to filter the scanned traffic. All traffic that is permitted by the ACL is subject to inspection by the IPS. Traffic that is denied by the ACL is not inspected by the IPS.</p>
</div>
<p><strong>20.</strong> A system analyst is configuring and tuning a recently deployed IPS appliance. By examining the IPS alarm log, the analyst notices that the IPS does not generate alarms for a few known attack packets. Which term describes the lack of alarms by the IPS?</p>
<ul style="list-style-type: circle;">
<li>false positive</li>
<li><strong>false negative</strong></li>
<li>true positive</li>
<li>true negative</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The alarms generated by an IPS can be classified into 4 types:<br />
A false positive occurs when an IPS generates an alarm on normal user traffic that should not have triggered an alarm.<br />
A false negative occurs when an IPS fails to generate an alarm after processing attack traffic the IPS is configured to detect.<br />
A true positive occurs when an IPS generates an alarm in response to known attack traffic.<br />
A true negative occurs when normal network traffic does not generate an alarm.</p>
</div>
<p><strong>21.</strong> Which statement is true about an atomic alert that is generated by an IPS?</p>
<ul style="list-style-type: circle;">
<li><strong>It is an alert that is generated every time a specific signature has been found.</strong></li>
<li>It is a single alert sent for multiple occurrences of the same signature.</li>
<li>It is both a normal alarm and a summary alarm being sent simultaneously at set intervals.</li>
<li>It is an alert that is used only when a logging attack has begun.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>The two main alert generation mechanisms for IDS/IPS devices are atomic and summary alerts. Atomic alerts are generated every time a signature triggers. With a summary alert, a single atomic alert is generated for the first detection of an attack. Then the duplicate alarms are counted, but not sent, for a specific time period. When it reaches the specified time period, an alert is sent that indicates the number of alarms that occurred during the time interval.</p>
</div>
<p><strong>22.</strong> What are two shared characteristics of the IDS and the IPS? (Choose two.)</p>
<ul style="list-style-type: circle;">
<li><strong>Both are deployed as sensors.</strong></li>
<li>Both analyze copies of network traffic.</li>
<li><strong>Both use signatures to detect malicious traffic.</strong></li>
<li>Both rely on an additional network device to respond to malicious traffic.</li>
<li>Both have minimal impact on network performance.</li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>Both the IDS and the IPS are deployed as sensors and use signatures to detect malicious traffic. The IDS analyzes copies of network traffic, which results in minimal impact on network performance. The IDS also relies on an IPS to stop malicious traffic.</p>
</div>
<p><strong>23.</strong> A network administrator suspects the default setting of the ip ips notify sdee command has caused performance degradation on the Cisco IOS IPS router. The network administrator enters the ip sdee events 50 command in an attempt to remedy the performance issues. What is the immediate effect of this command?</p>
<ul style="list-style-type: circle;">
<li>The newest 50 events from the original buffer are saved and all others are deleted.</li>
<li>The oldest 50 events of the original buffer are deleted.</li>
<li>All events that were stored in the original buffer are saved, while a new buffer is created to store new events.</li>
<li><strong>All events that were stored in the previous buffer are lost.</strong></li>
</ul>
<div class="bs-shortcode-alert alert alert-success">
<p>When sending IPS notification with SDEE format, the buffer on the router stores up to 200 events by default. If a smaller buffer is requested, all stored events are lost. If a larger buffer is requested, all stored events are saved. The default buffer can be altered with the ip sdee events command. All stored events are lost when Cisco SDEE notification is disabled. A new buffer is allocated when the notifications are re-enabled.</p>
</div>
<div class="ui-widget ui-widget-content"></div>
<div class="ui-widget ui-widget-content">
<p>That is all the <a href="https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-security.html" target="_blank" rel="noopener noreferrer">CCNA Security</a> chapter 5 exam questions and answers with description. Please share new CCNA Security Chapter 5 exam questions via the comment section. We will update and share the new CCNA security questions and answers.</p>
<hr />
<p><strong> Related Queries:</strong> CCNA Security chapter 5 exam questions with Answers</p>
<p>CCNA security chapter 5 exam answers<br />
CCNA security pretest exam answers<br />
CCNA security final exam answers 2018<br />
CCNAs chapter 2 exam answers<br />
CCNA security v2 chapter 6 exam answers<br />
Cisco cybersecurity final exam answers<br />
CCNA security v2 chapter 7 exam answers<br />
CCNA security NetAcad</p>
</div>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/">CCNA Security Chapter 5 Exam Questions With Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-5-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15194</post-id>	</item>
		<item>
		<title>CCNA Security Chapter 4 Exam Questions with Answers – Updated</title>
		<link>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/</link>
					<comments>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 30 Aug 2018 01:29:07 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[CCNA Security Chapter 4 Answers]]></category>
		<category><![CDATA[CCNA Security Exam Answers]]></category>
		<category><![CDATA[CCNA Security Exam Questions]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=15054</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="583" height="213" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Exam Questions and Answers" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></div>
<p>The latest update of CCNA Security chapter 4 exam questions and answers are available for review and educational purposes. You can find this questions on netacad CCNA Security chapter 4 exam test. Please don&#8217;t forget to share the CCNA Security chapter 4 exam questions via comment section for keeping this list up-to-date. CCNA Security Chapter [&#8230;]</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/">CCNA Security Chapter 4 Exam Questions with Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="583" height="213" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Security Exam Questions and Answers" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></div><p>The latest update of CCNA Security chapter 4 exam questions and answers are available for review and educational purposes. You can find this questions on <a href="https://netacad.com/" target="_blank" rel="noopener noreferrer">netacad</a> CCNA Security chapter 4 exam test.</p>
<p>Please don&#8217;t forget to share the CCNA Security chapter 4 exam questions via comment section for keeping this list up-to-date.</p>
<h3>CCNA Security Chapter 4 Exam Questions with Answers</h3>
<p><strong>1:</strong> What is one benefit of using a stateful firewall instead of a proxy server?</p>
<p style="padding-left: 30px;">prevention of Layer 7 attacks</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">better performance</span></strong></p>
<p style="padding-left: 30px;">ability to perform user authentication</p>
<p style="padding-left: 30px;">ability to perform packet filtering</p>
<p><a style="font-weight: bold; background-color: #ffffff; display: inline !important;" href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-Latest-Update.png"><img loading="lazy" decoding="async" class="wp-image-15056 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-Latest-Update.png" alt="CCNA Security Chapter 4 Exam Questions with Answers Latest Update" width="300" height="90" /></a></p>
<p>CCNA Security Chapter 4 Exam Questions</p>
<p><strong>2:</strong> Refer to the exhibit. Which statement describes the function of the ACEs?</p>
<p style="padding-left: 30px;">These ACEs automatically appear at the end of every IPv6 ACL to allow IPv6 routing to occur.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">These ACEs allow for IPv6 neighbor discovery traffic.</span></strong></p>
<p style="padding-left: 30px;">These are optional ACEs that can be added to the end of an IPv6 ACL to allow ICMP messages that are defined in object groups named nd-na and nd-ns.</p>
<p style="padding-left: 30px;">These ACEs must be manually added to the end of every IPv6 ACL to allow IPv6 routing to occur.</p>
<p><strong>3:</strong> When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?</p>
<p style="padding-left: 30px;">ACEs to prevent SNMP traffic</p>
<p style="padding-left: 30px;">ACEs to prevent broadcast address traffic</p>
<p style="padding-left: 30px;">ACEs to prevent ICMP traffic</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">ACEs to prevent traffic from private address spaces</span></strong></p>
<p style="padding-left: 30px;">ACEs to prevent HTTP traffic</p>
<p><strong>4:</strong> Which type of packet is unable to be filtered by an outbound ACL?</p>
<p style="padding-left: 30px;">ICMP packet</p>
<p style="padding-left: 30px;">multicast packet</p>
<p style="padding-left: 30px;">broadcast packet</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">router-generated packet</span></strong></p>
<p><strong>5:</strong> Which command will verify a Zone-Based Policy Firewall configuration?</p>
<p style="padding-left: 30px;">show protocols</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">show running-config</span></strong></p>
<p style="padding-left: 30px;">show zones</p>
<p style="padding-left: 30px;">show interfaces</p>
<figure id="attachment_15055" aria-describedby="caption-attachment-15055" style="width: 427px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png"><img loading="lazy" decoding="async" class="wp-image-15055 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png" alt="CCNA Security Chapter 4 Exam Questions with Answers" width="427" height="399" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers-.png 427w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Chapter-4-Exam-Questions-with-Answers--300x280.png 300w" sizes="(max-width: 427px) 100vw, 427px" /></a><figcaption id="caption-attachment-15055" class="wp-caption-text">CCNA Security Chapter 4 Exam Questions with Answers</figcaption></figure>
<p><strong>6:</strong> Refer to the exhibit. The network &#8220;A&#8221; contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as &#8220;A&#8221;?</p>
<p style="padding-left: 30px;">internal network</p>
<p style="padding-left: 30px;">perimeter security boundary</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">DMZ</span></strong></p>
<p style="padding-left: 30px;">untrusted network</p>
<p><strong>7:</strong> A company is deploying a new network design in which the border router has three interfaces. Interface Serial0/0/0 connects to the ISP, GigabitEthernet0/0 connects to the DMZ, and GigabitEthernet/01 connects to the internal private network. Which type of traffic would receive the least amount of inspection (have the most freedom of travel)?</p>
<p style="padding-left: 30px;">traffic that originates from the public network and that is destined for the DMZ</p>
<p style="padding-left: 30px;">traffic that is returning from the DMZ after originating from the private network</p>
<p style="padding-left: 30px;">traffic that is returning from the public network after originating from the private network</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">traffic that is going from the private network to the DMZ</span></strong></p>
<p><strong>8:</strong> When a Cisco IOS Zone-Based Policy Firewall is being configured via CLI, which step must be taken after zones have been created?</p>
<p style="padding-left: 30px;">Design the physical infrastructure.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Establish policies between zones.</span></strong></p>
<p style="padding-left: 30px;">Assign interfaces to zones.</p>
<p style="padding-left: 30px;">Identify subsets within zones.</p>
<figure id="attachment_15057" aria-describedby="caption-attachment-15057" style="width: 583px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png"><img loading="lazy" decoding="async" class="wp-image-15057 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png" alt="CCNA Security Exam Questions and Answers" width="583" height="213" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers.png 583w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Questions-and-Answers-300x110.png 300w" sizes="(max-width: 583px) 100vw, 583px" /></a><figcaption id="caption-attachment-15057" class="wp-caption-text">CCNA Security Exam Questions and Answers</figcaption></figure>
<p><strong>9:</strong> Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?</p>
<p style="padding-left: 30px;">The initial packet is dropped, but subsequent packets are forwarded.</p>
<p style="padding-left: 30px;">The packet is forwarded, and no alert is generated.</p>
<p style="padding-left: 30px;">The packet is forwarded, and an alert is generated.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The packet is dropped.</span></strong></p>
<p><strong>10:</strong> Which command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?</p>
<p style="padding-left: 30px;">ipv6 access-class ENG_ACL in</p>
<p style="padding-left: 30px;">ipv6 traffic-filter ENG_ACL out</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">ipv6 traffic-filter ENG_ACL in</span></strong></p>
<p style="padding-left: 30px;">ipv6 access-class ENG_ACL out</p>
<p><strong>11:</strong> Consider the following access list.</p>
<p><strong>access-list 100 permit ip host 192.168.10.1 any</strong><br />
<strong>access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo</strong><br />
<strong>access-list 100 permit ip any any</strong></p>
<p>Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)</p>
<p style="padding-left: 30px;">Only the network device assigned the IP address 192.168.10.1 is allowed to access the router.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Devices on the 192.168.10.0/24 network can sucessfully ping devices on the 192.168.11.0 network.</span></strong></p>
<p style="padding-left: 30px;">Devices on the 192.168.10.0/24 network are not allowed to reply to any ping requests.</p>
<p style="padding-left: 30px;">Only Layer 3 connections are allowed to be made from the router to any other network device.</p>
<p><strong>12:</strong> In addition to the criteria used by extended ACLs, what conditions are used by a classic firewall to filter traffic?</p>
<p style="padding-left: 30px;">IP source and destination addresses</p>
<p style="padding-left: 30px;">TCP/UDP source and destination port numbers</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">application layer protocol session information</span></strong></p>
<p style="padding-left: 30px;">TCP/IP protocol numbers</p>
<p><strong>13:</strong> To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?</p>
<p style="padding-left: 30px;">time-stamp request</p>
<p style="padding-left: 30px;">router advertisement</p>
<p style="padding-left: 30px;">time-stamp reply</p>
<p style="padding-left: 30px;">echo request</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">echo reply</span></strong></p>
<p><a style="font-weight: bold; background-color: #ffffff; display: inline !important;" href="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-15058 size-full" src="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg" alt="CCNA Security Exam Answers" width="572" height="46" srcset="https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers-.jpg 572w, https://www.technig.com/wp-content/uploads/2018/08/CCNA-Security-Exam-Answers--300x24.jpg 300w" sizes="(max-width: 572px) 100vw, 572px" /></a></p>
<p>CCNA Security Exam Answers</p>
<p><strong>14:</strong> Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Choose two.)</p>
<p style="padding-left: 30px;">SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.</p>
<p style="padding-left: 30px;">Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.</p>
<p style="padding-left: 30px;">Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.</span></strong></p>
<p style="padding-left: 30px;">SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.</p>
<p><strong>15:</strong> Which two rules about interfaces are valid when implementing a Zone-Based Policy Firewall? (Choose two.)</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">If neither interface is a zone member, then the action is to pass traffic.</span></strong></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">If both interfaces are members of the same zone, all traffic will be passed.</span></strong></p>
<p style="padding-left: 30px;">If one interface is a zone member and a zone-pair exists, all traffic will be passed.</p>
<p style="padding-left: 30px;">If one interface is a zone member, but the other is not, all traffic will be passed.</p>
<p style="padding-left: 30px;">If both interfaces belong to the same zone-pair and a policy exists, all traffic will be passed.</p>
<p><strong>16:</strong> When a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)</p>
<p style="padding-left: 30px;">hold</p>
<p style="padding-left: 30px;">copy</p>
<p style="padding-left: 30px;">forward</p>
<p style="padding-left: 30px;">log</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>drop</strong></span></p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">inspect</span></strong></p>
<p><strong>17:</strong> If the provided ACEs are in the same ACL, which ACE should be listed first in the ACL according to best practice?</p>
<p style="padding-left: 30px;">permit tcp 172.16.0.0 0.0.3.255 any established</p>
<p style="padding-left: 30px;">permit udp any any range 10000 20000</p>
<p style="padding-left: 30px;">deny tcp any any eq telnet</p>
<p style="padding-left: 30px;">permit ip any any</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">permit udp 172.16.0.0 0.0.255.255 host 172.16.1.5 eq snmptrap</span></strong></p>
<p style="padding-left: 30px;">deny udp any host 172.16.1.5 eq snmptrap</p>
<p><strong>18:</strong> What is the function of the pass action on a Cisco IOS Zone-Based Policy Firewall?</p>
<p style="padding-left: 30px;">tracking the state of connections between zones</p>
<p style="padding-left: 30px;">inspecting traffic between zones for traffic control</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">forwarding traffic from one zone to another</span></strong></p>
<p style="padding-left: 30px;">logging of rejected or dropped packets</p>
<p><strong>19:</strong> A router has been configured as a classic firewall and an inbound ACL applied to the external interface. Which action does the router take after inbound-to-outbound traffic is inspected and a new entry is created in the state table?</p>
<p style="padding-left: 30px;">When traffic returns from its destination, it is reinspected, and a new entry is added to the state table.</p>
<p style="padding-left: 30px;">The internal interface ACL is reconfigured to allow the host IP address access to the Internet.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">A dynamic ACL entry is added to the external interface in the inbound direction.</span></strong></p>
<p style="padding-left: 30px;">The entry remains in the state table after the session is terminated so that it can be reused by the host.</p>
<p><strong>20:</strong> Which statement describes a typical security policy for a DMZ firewall configuration?</p>
<p style="padding-left: 30px;">Traffic that originates from the inside interface is generally blocked entirely or very selectively permitted to the outside interface.</p>
<p style="padding-left: 30px;">Return traffic from the inside that is associated with traffic originating from the outside is permitted to traverse from the inside interface to the outside interface.</p>
<p style="padding-left: 30px;">Return traffic from the outside that is associated with traffic originating from the inside is permitted to traverse from the outside interface to the DMZ interface.</p>
<p style="padding-left: 30px;">Traffic that originates from the outside interface is permitted to traverse the firewall to the inside interface with few or no restrictions.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">Traffic that originates from the DMZ interface is selectively permitted to the outside interface.</span></strong></p>
<p><strong>21:</strong> A network administrator is implementing a Classic Firewall and a Zone-Based Firewall concurrently on a router. Which statement best describes this implementation?</p>
<p style="padding-left: 30px;">A Classic Firewall and Zone-Based Firewall cannot be used concurrently.</p>
<p style="padding-left: 30px;"><strong><span style="color: #339966;">The two models cannot be implemented on a single interface.</span></strong></p>
<p style="padding-left: 30px;">An interface must be assigned to a security zone before IP inspection can occur.</p>
<p style="padding-left: 30px;">Both models must be implemented on all interfaces.</p>
<p><strong>22:</strong> What is one limitation of a stateful firewall?</p>
<p style="padding-left: 30px;">poor log information</p>
<p style="padding-left: 30px;">cannot filter unnecessary traffic</p>
<p style="padding-left: 30px;">weak user authentication</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>not as effective with UDP- or ICMP-based traffic</strong></span></p>
<p><strong>23:</strong> Which security tool monitors network traffic as it flows into and out of the organization and determines whether packets belong to an existing connection or are from an unauthorized source?</p>
<p style="padding-left: 30px;">web security appliance</p>
<p style="padding-left: 30px;">application proxy</p>
<p style="padding-left: 30px;"><span style="color: #339966;"><strong>stateful firewall</strong></span></p>
<p style="padding-left: 30px;">intrusion protection system</p>
<p>That&#8217;s all the updated CCNA Security chapter 4 exam questions and answers you need to review and test to learn more about CCNA security chapter 4 exam questions.</p>
<hr />
<p><strong> Related Questions: CCNA Security chapter 4 exam questions and answers</strong></p>
<p>CCNA security chapter 4 exam answers<br />
CCNA security chapter 4 exam answers 2018<br />
CCNA security final exam answers 2018<br />
CCNAs chapter 2 exam answers<br />
The inspect action in a cisco ios zone-based policy firewall configures cisco ios packet inspection.<br />
CCNA security netacad<br />
CCNA security chapter 5 exam answers 2018<br />
A Cisco ids does not affect the flow of traffic when it operates in promiscuous mode.</p>
<p>The post <a href="https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/">CCNA Security Chapter 4 Exam Questions with Answers – Updated</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/ccna-security-chapter-4-exam-questions-answers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15054</post-id>	</item>
	</channel>
</rss>
