CCNA Security FAQ: Network Security Using Cisco IOS IPS Question. True or false. An IDS is a passive technology that only reports when events trigger signatures, whereas an IPS not only reports but also blocks the intrusion. Answer: False. This is a bit of a trick question. What makes an IDS an intrusion detection system is that it might miss trigger packets from an attack … [Read more...]
CCNA Security FAQ: Virtual Private Networks with IPsec
CCNA Security FAQ: Virtual Private Networks with IPsec Question. True or false. Site-to-site IPsec VPNs are an evolution of dial-up networking. Answer: The correct answer is false. Site-to-site IPsec VPNs are an evolution of WAN technology. Question. Which of the following is not considered a feature that can be configured as part of an IPsec VPN? (Choose all that … [Read more...]
CCNA Security FAQ: Introducing Cryptographic Services
CCNA Security FAQ: Introducing Cryptographic Services Question. Fill in the blanks with the best choice from the list. Cryptography is the art of code __________ and cryptanalysis is the art of code __________. A. Graphing, analyzing B. Generation, cracking C. Making, breaking D. Breaking, making E. None of the above Answer: is C. Cryptography is the art of creating and … [Read more...]
CCNA Security FAQ: Using Cisco IOS Firewalls to Implement a Network Security Policy
CCNA Security FAQ: Using Cisco IOS Firewalls to Implement a Network Security Policy Question. Which of the following is the best description of a firewall? (Choose one.) A. Firewalls statefully inspect reply packets to determine whether they match the expected state of a connection in the state table. B. Firewalls statically inspect packets in both directions and filter … [Read more...]
CCNA Security FAQ: Building a Secure Network Using Security Controls
CCNA Security FAQ: Building a Secure Network Using Security Controls Q1. Put the following steps in the Cisco Secure Network Life Cycle in the right order: A. Acquisition and Development B. Disposition C. Operations and Maintenance D. Initiation E. Implementation Answer: The correct order is D, A, E, C, and B: Initiation -> Acquisition and Development -> … [Read more...]
CCNA Security FAQ: Implementing Secure Management and Hardening the Router
CCNA Security FAQ: Implementing Secure Management and Hardening the Router Q1. Which of the following is not a consideration for setting up technical controls in support of secure logging? A. How can the confidentiality of logs as well as communicating log messages be assured? B. How do you log events from several devices in one central place? C. What are the most critical … [Read more...]