CCNA 3 v7

Modules 3 – 5: Network Security Exam Answers

Modules 3 – 5: Network Security Exam Answers

1. Which two commands will configure a standard ACL? (Choose two.)

  • Router(config)# access-list 20 permit host any any
  • Router(config)# access-list 90 permit
  • Router(config)# access-list 45 permit host
  • Router(config)# access-list 10 permit any
  • Router(config)# access-list 35 permit host

2. To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?

  • echo request
  • echo reply
  • time-stamp request
  • time-stamp reply
  • router advertisement

3. What two ACEs could be used to deny IP traffic from a single source host to the network? (Choose two.)

  • access-list 100 deny ip host
  • access-list 100 deny ip host
  • access-list 100 deny ip
  • access-list 100 deny ip
  • access-list 100 deny ip
  • access-list 100 deny ip

4. An administrator has configured an access list on R1 to allow SSH administrative access from host Which command correctly applies the ACL?

  • R1(config-if)# ip access-group 1 in
  • R1(config-if)# ip access-group 1 out
  • R1(config-line)# access-class 1 in
  • R1(config-line)# access-class 1 out

5. Which algorithm can ensure data confidentiality?

  • MD5
  • AES
  • RSA
  • PKI

6. What three items are components of the CIA triad? (Choose three.)

  • access
  • integrity
  • scalability
  • availability
  • confidentiality
  • intervention

7. Which cyber attack involves a coordinated attack from a botnet of zombie computers?

  • DDoS
  • MITM
  • ICMP redirect
  • address spoofing

8. What specialized network device is responsible for enforcing access control policies between networks?

  • switch
  • IDS
  • bridge
  • firewall

9. To which category of security attacks does man-in-the-middle belong?

  • DoS
  • access
  • reconnaissance
  • social engineering

10. What is the role of an IPS?

  • to detect patterns of malicious traffic by the use of signature files
  • to enforce access control policies based on packet content
  • to filter traffic based on defined rules and connection context
  • to filter traffic based on Layer 7 information

11. Which type of DNS attack involves the cybercriminal compromising a parent domain and creating multiple subdomains to be used during the attacks?

  • cache poisoning
  • amplification and reflection
  • tunneling
  • shadowing

12. Which two types of hackers are typically classified as grey hat hackers? (Choose two.)

  • state-sponsored hackers
  • hacktivists
  • script kiddies
  • cyber criminals
  • vulnerability brokers

13. What is a significant characteristic of virus malware?

  • A virus is triggered by an event on the host system.
  • Once installed on a host system, a virus will automatically propagate itself to other systems.
  • A virus can execute independently of the host system.
  • Virus malware is only distributed over the Internet.

14. A cleaner attempts to enter a computer lab but is denied entry by the receptionist because there is no scheduled cleaning for that day. What type of attack was just prevented?

  • Trojan
  • shoulder surfing
  • war driving
  • social engineering
  • phishing

15. Which two conditions would cause a router to drop a packet? (Choose two.)

  • No inbound ACL exists on the interface where the packet enters the router.
  • The ACL that is affecting the packet does not contain at least one deny ACE.
  • The packet source address does not match the source as permitted in a standard inbound ACE.
  • No outbound ACL exists on the interface where the packet exits the router.
  • No routing table entry exists for the packet destination, but the packet matches a permitted address in an outbound ACL.

16. A network administrator configures an ACL with the command R1(config)# access-list 1 permit Which two IP addresses will match this ACL statement? (Choose two.)


17. Which two statements describe appropriate general guidelines for configuring and applying ACLs? (Choose two.)

  • Multiple ACLs per protocol and per direction can be applied to an interface.
  • If an ACL contains no permit statements, all traffic is denied by default.
  • The most specific ACL statements should be entered first because of the top-down sequential nature of ACLs.
  • Standard ACLs are placed closest to the source, whereas extended ACLs are placed closest to the destination.
  • If a single ACL is to be applied to multiple interfaces, it must be configured with a unique number for each interface.

18. What single access list statement matches all of the following networks?

  • access-list 10 permit
  • access-list 10 permit
  • access-list 10 permit
  • access-list 10 permit

19. Which three statements describe ACL processing of packets? (Choose three.)

  • An implicit deny any rejects any packet that does not match any ACE.
  • A packet can either be rejected or forwarded as directed by the ACE that is matched.
  • A packet that has been denied by one ACE can be permitted by a subsequent ACE.
  • A packet that does not match the conditions of any ACE will be forwarded by default.
  • Each statement is checked only until a match is detected or until the end of the ACE list.
  • Each packet is compared to the conditions of every ACE in the ACL before a forwarding decision is made.

20. A network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?

  • All traffic is denied.
  • All traffic is permitted.
  • The ACL does not perform as designed.
  • The ACL will analyze traffic after it is routed to the outbound interface.

21. Which scenario would cause an ACL misconfiguration and deny all traffic?

  • Apply a standard ACL in the inbound direction.
  • Apply a named ACL to a VTY line.
  • Apply an ACL that has all deny ACE statements.
  • Apply a standard ACL using the ip access-group outcommand.

22. In applying an ACL to a router interface, which traffic is designated as outbound?

  • traffic that is coming from the source IP address into the router
  • traffic that is leaving the router and going toward the destination host
  • traffic that is going from the destination IP address into the router
  • traffic for which the router can find no routing table entry

23. When creating an ACL, which keyword should be used to document and interpret the purpose of the ACL statement on a Cisco device?​

  • eq
  • established
  • remark
  • description

24. Which location is recommended for extended numbered or extended named ACLs?

  • a location as close to the destination of traffic as possible
  • a location as close to the source of traffic as possible
  • a location centered between traffic destinations and sources to filter as much traffic as possible
  • if using the established keyword, a location close to the destination to ensure that return traffic is allowed

25. Which range represents all the IP addresses that are affected when network with a wildcard mask of is used in an ACE?

  • to
  • to
  • to
  • to

26. A college student is studying for the Cisco CCENT certification and is visualizing extended access lists. Which three keywords could immediately follow the keywords permit or deny as part of an extended access list? (Choose three.)

  • www
  • tcp
  • udp
  • icmp
  • telnet
  • ftp

27. If the provided ACEs are in the same ACL, which ACE should be listed first in the ACL according to best practice?

  • permit ip any any
  • permit udp host eq snmptrap
  • permit tcp any established
  • permit udp any any range 10000 20000
  • deny udp any host eq snmptrap
  • deny tcp any any eq telnet

28. Which operator is used in an ACL statement to match packets of a specific application?

  • eq
  • lt
  • gt
  • established

29. The computers used by the network administrators for a school are on the network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)

  • access-class 5 in
  • access-list 5 deny any
  • access-list standard VTY
  • access-list 5 permit
  • ip access-group 5 out
  • ip access-group 5 in

30. Consider the configured access list.

R1# show access-lists
extended IP access list 100
deny tcp host host eq telnet
deny tcp host host eq telnet
permit ip any any (15 matches)

What are two characteristics of this access list? (Choose two.)

  • The access list has been applied to an interface.
  • A network administrator would not be able to tell if the access list has been applied to an interface or not.
  • The device is not allowed to telnet to the device.
  • Any device on the network (except the device) can telnet to the router that has the IP address assigned.
  • Only the device can telnet to the router that has the IP address assigned.
  • Any device can telnet to the device.

31. Which command will verify the number of packets that are permitted or denied by an ACL that restricts SSH access?

  • show running-config
  • show ip interface brief
  • show access-lists
  • show ip ssh​

32. Which access list statement permits HTTP traffic that is sourced from host port 4300 and destined to host

  • access-list 101 permit tcp any eq 4300
  • access-list 101 permit tcp eq 80
  • access-list 101 permit tcp eq www eq www
  • access-list 101 permit tcp eq 4300 eq www
  • access-list 101 permit tcp host eq 80 eq 4300

33. When configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?

  • The ACL must be applied to each vty line individually.
  • The ACL is applied to the Telnet port with the ip access-group command.
  • Apply the ACL to the vty lines without the in or out option required when applying ACLs to interfaces.
  • The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

34. What packets would match the access control list statement that is shown below?

access-list 110 permit tcp any eq 22

  • SSH traffic from the network to any destination network
  • SSH traffic from any source network to the network
  • any TCP traffic from any host to the network
  • any TCP traffic from the network to any destination network

35. Consider the access list command applied outbound on a router serial interface.

access-list 100 deny icmp any echo reply

What is the effect of applying this access list command?

  • The only traffic denied is ICMP-based traffic. All other traffic is allowed.
  • The only traffic denied is echo-replies sourced from the network. All other traffic is allowed.
  • Users on the network are not allowed to transmit traffic to any other destination.
  • No traffic will be allowed outbound on the serial interface.

36. Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?

R1# <output omitted>
Standard IP access list 2
10 permit, wildcard bits (2 matches)
20 deny any (1 match)

  • Two devices connected to the router have IP addresses of 192.168.10.x.
  • Traffic from one device was not allowed to come into one router port and be routed outbound a different router port.
  • Two devices were able to use SSH or Telnet to gain access to the router.
  • Traffic from two devices was allowed to enter one router port and be routed outbound to a different router port.

Related Articles

Leave a Reply

Photo and Image Files
Audio and Video Files
Other File Types

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Notify of
Back to top button

Send this to a friend